Wireless networks have the potential to create enterprise networking much more efficient and price effective. it's abundant easier to line a user up with a wireless network affiliation than to run Ethernet cabling from the nearest switch, through the walls and install a network jack at their desk. Wireless networks additionally facilitate resolve the fairly ubiquitous problem of getting too few network connections in conference rooms, and therefore the proven fact that the conference space network connections are forever at the smallest amount useful location potential.
The convenience of wireless networks comes with a value though. Wired network access will be controlled as a result of the info is contained inside the cabling that connects the computer to the switch. With awireless network, the “cabling” between the computer and therefore the switch is termed “air”, which any device inside vary will probably access. If a user will connect with awireless access point from three hundred feet away, then in theory so will anyone else inside a three hundred foot radius of the wireless access point.
Threats to Wireless Network Security
Aside from the threat of unauthorized users accessing your network and eavesdropping your internal network communications by connecting with yourwireless LAN (WLAN), there are a spread of threats posed by insecure, or improperly secured WLAN’s. Here may be a brief list with descriptions of some of the primary threats:
* Rogue WLAN’s – Whether your enterprise has an officially sanctioned wireless network or not, wireless routers are relatively inexpensive, and ambitious users may plug unauthorized equipment into the network. These rogue wireless networks may be insecure or improperly secured and pose a risk to the network at large.
* Spoofing Internal Communications – An attack from outside of the network can usually be identified as such. If an attacker can connect with your WLAN, they can spoof communications that appear to come from internal domains. Users are much more likely to trust and act on spoofed internal communications.
* Theft of Network Resources – Even if an intruder does not attack your computers or compromise your data, they may connect to your WLAN and hijack your network bandwidth to surf the Web. They can leverage the higher bandwidth found on most enterprise networks to download music and video clips, using your precious network resources and impacting network performance for your legitimate users.