Linksys WVC11B manual Passive Attacks, Jamming Attacks

Page 66

Wireless-B Internet Video Camera

But even WEP has its problems. WEP’s encryption algorithm is referred to as “simple”, which also means “weak”, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent hacker.

There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as:

1.Passive Attacks

2.Jamming Attacks

3.Active Attacks

4.Dictionary-building or Table Attacks

5.Man-in-the-Middle Attacks

Passive Attacks

There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message conversations, emails, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a “packet sniffer”, software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security.

Jamming Attacks

Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions.

Appendix B: Wireless Security

59

What Are The Risks?

Image 66
Contents Wireless- B How to Use this Guide Copyright and TrademarksTable of Contents View Video Setup Help Appendix a TroubleshootingAppendix B Wireless Security Common Problems and Solutions Frequently Asked QuestionsList of Figures Camera LEDsFind Camera from LAN 17 Create Links Introduction What’s in this Guide? Wireless-B Internet Video Camera Planning Your Wireless Network Ad-Hoc and Infrastructure ModesNetwork Layout Planning Your Wireless Network Network Layout Getting to Know the Wireless-B Internet Video Camera LANReset Connection to a Wireless Ad-Hoc Network for Setup Connecting the Wireless-B Internet Video Camera for SetupConnection to a Wired Network for Setup OverviewMoving the Camera to a Different Network Setting up and Mounting the Wireless-B Internet Video Camera Setup WizardCameras Found Dhcp or Static IP Address Mode Settings 10 Security Settings 12 Review New Settings Placement Options Stand OptionWall Mount Option Installing the Viewer & Recorder Utility Install Viewer & Recorder UtilityChoose Destination Location Using the Viewer & Recorder Utility CamerasFind LANChange Settings InternetDelete 12 Delete CameraView 13 View VideoScheduled Recordings in Progress FilesPreferences ScheduleAdd Stop21 Stop Scheduled Recording Setting up the Linksys SoloLink Ddns Service Setup Wizard for the SoloLink Ddns ServiceSoloLink for Dynamic IP Address Check Connections User Name and Password Login Confirm Active Internet Connection 11 Sign Up 12 Confirmation of New Settings 14 Confirm Your Location ID 17 Create Links 19 Account Confirmation of Camera SoloLink Registration of Additional Cameras 21 Port Forwarding Information24 SoloLink Ddns How to Access the Web-based Utility View VideoSetup Security WarningDevice Settings LAN SettingsBasic Wireless Settings WEP Key SettingsImage Resolution Quality Level Bit RateVideo Settings Estimated Bit Rates for Video Viewing or RecordingAdministrator PasswordAdjustments OptionsUser Access UsersUser Database SoloLink Ddns SoloLink DdnsStatus SoloLink Registration of Additional CamerasWireless-B Internet Video Camera Status LogAdvanced UPnP18 Administrator Help Help19 Upgrade Firmware Appendix a Troubleshooting Common Problems and SolutionsWhen I view the video, it seems blurry Frequently Asked Questions Can I view video using a Macintosh or Netscape Navigator?How many users can view the Camera’s video at the same time? Appendix B Wireless Security Brief OverviewWhat Are The Risks? Passive Attacks Jamming AttacksDictionary-Building or Table Attacks Maximizing Wireless SecurityActive Attacks Man-in-the-Middle AttacksWireless-B Internet Video Camera Ssid Wireless-B Internet Video Camera Figure B-2 WEP Key Settings WEP EncryptionFigure C-1 Upgrade Firmware Appendix C Upgrading FirmwareAppendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera Wireless-B Internet Video Camera Appendix F Specifications User Authentication, WEP EncryptionStandards Ieee 8011.b, Ieee 802.3, 802.3u Ports Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information FCC StatementSoftware License Agreement Wireless-B Internet Video Camera Industry Canada Canada Wireless-B Internet Video Camera Appendix I Contact Information Need to contact Linksys?Information section in this Guide