Yorkville High School Computer Science Department
Yorkville High School Computer Science Department on Facebook  Yorkville High School Computer Science Department Twitter Feed  Yorkville High School Computer Science Department on Instagram

Yorkville High School Computer Science

ASSIGNMENTS: No Current Assignments

Computer Security :: Lessons :: Wireless Network Security

Wireless Security

Wireless networks introduce a number of security problems beyond those found in wired networks. Some of the key factors contributing to the higher security risk of wireless networks include the following:

Put simply, there are three points of attack on a wireless network: the wireless client (smartphone, computer, tablet), the wireless access point (router, cell tower, hotspot), and the wireless transmission itself. The following are potential security threats to wireless networks:

Two ways to secure wireless transmissions would be encryption as well as signal-hiding techniques. Signal-hiding techniques include turning off the service set identifier (SSID) broadcast by wireless access points, assigning cryptic names to SSID (ie not "xfinitywifi"), reducing signal strength to the lowest level that still provides required coverage, and locating wireless access points in the interior of the building away from windows and exterior walls.

The following techniques are recommended for wireless network security:

  1. Use encryption
  2. Use antivirus software and a firewall
  3. Turn off SSID broadcasting
  4. Change the SSID from the default
  5. Change your router's pre-set administrator password
  6. Allow only specific computers to access your network using a MAC white list

Mobile Device Security

The increase of "bring your own device" policies has made network security even harder. In the past a company's network was limited to the Windows PCs within the company and users could not install their own application. Now, an organization's network must accommodate the following:

Below are some of the security threats involving mobile devices:

Mobile Device Security

Below are the elements of a mobile device security strategy. The following steps should also be taken on any mobile devices used in the organization:

Yorkville High School Computer Science Department on Facebook Yorkville High School Computer Science Department Twitter Feed Yorkville High School Computer Science Department on Instagram