Introduction
Welcome to Caution! Wireless Networking: Preventing a Data Disaster. Wireless networking is quickly replacing Ethernet networks in many of our homes and offices. The pace of adoption of Wi-Fi technology has been remarkably quick, primarily because wireless networking equipment is easy to set up and use. In fact, in most cases it’s less complicated than setting up an Ethernet network.
Unfortunately, the downside to user-friendly Wi-Fi gear is that the majority of people setting up wireless networks in their homes or offices are not securing them correctly, if at all. Unlike Ethernet networks that require a user to be attached or plugged-into the network, Wi-Fi networks broadcast their signal in all directions, allowing anyone with a wireless adapter to access the network. If you haven’t taken the time to secure your Wi-Fi equipment, you may be sharing your files and Internet connection with your neighbors, or worse, hackers.
There are plenty of wireless books available that address basic wireless networking or the setup of specific products. In this book, I focus on the security and safety consequences of using these devices and try to explain these issues in a manner that’s helpful to new and intermediate wireless users.
I won’t discuss specific brands or provide step-by-step instruction for setting up your access point or router; my goal is to illuminate you about the risks associated with your new wireless equipment and provide some solutions for improving the security on your network. Using this book you’ll learn the following things:
How TCP/IP networks work
How Wi-Fi networks operate
Why wireless technology is insecure
How you are vulnerable
How you can protect your computer and networks
Once you have a basic understanding of the topics covered in this book, I hope you’ll be interested enough to learn more about them. Continued education is one of the most important things that you can do to maintain security of your computer and network.
Whom This Book is For
If you’re an average computer user — beginning or intermediate — and you’ve recently installed your own wireless network, then this book is for you. You don’t need to be a technical guru to benefit from the information I’ve presented inside this book. While a general knowledge of computing and familiarity with basic networking and Internet concepts is desirable, Part I provides an intro to networking that will have you up to speed in no time.
This book is for beginning or intermediate computer users who need a better understanding of the security issues surrounding wireless networks, and how to address them on their own network before they become a victim.
How This Book Is Organized
I’ve divided this book into two parts; each part includes chapters that address a common topic. If you’re relatively new to networking or only have a passing familiarity with TCP/IP and wireless security, I suggest you start in Part I and read the book in order. If you’re in a hurry or concerned that your network may be compromised, you can skip ahead and return to the earlier material later. Here’s how the parts are organized:
Part I: Understanding the Threat —
Part I introduces wireless technology and basic TCP/IP networking. It introduces the security and safety problems associated with wireless networks and with networking in general.
Part II: Protecting Yourself —
In Part II, I discuss the steps you can take to secure your network, protect your equipment from viruses, protect and recover your data, and maintain your privacy. If you’re concerned that your network is not secure, and you already have a grasp of the issues presented in Part I, you can start here.
Appendixes —
The appendixes provide useful resources relating to wireless networks. I’ve also included a glossary of many of the terms I’ve used in this book.
It’s my goal to acquaint you with wireless technology and the related security issues so that you’ll be encouraged to pursue more information and improve your computing knowledge. Wireless networks are here to stay, and I want you to get the most out of them without leaving yourself vulnerable.
Special features and icons
At the beginning of each chapter, you’ll find a short list of the broad topics covered therein. Throughout the text, you’ll encounter icons that I’ve used to bring different topics to your attention. Here’s what each of these icons indicates:
Note Note icons provide important related information about a subject.
On The Web The On the Web icon provides addresses to online resources about a topic.
Caution If I use the Caution icon, I’m warning you about something dangerous where you need to be particularly diligent. I don’t use this icon often, but if you see it please pay close attention to the information.
Cross-Reference The Cross-Reference icon directs you to related information elsewhere in the book.
I hope you find this book useful and informative and that it educates you about wireless networking and security and assists you in securing your wireless network.
Read comments
Welcome to Caution! Wireless Networking: Preventing a Data Disaster. Wireless networking is quickly replacing Ethernet networks in many of our homes and offices. The pace of adoption of Wi-Fi technology has been remarkably quick, primarily because wireless networking equipment is easy to set up and use. In fact, in most cases it’s less complicated than setting up an Ethernet network.
Unfortunately, the downside to user-friendly Wi-Fi gear is that the majority of people setting up wireless networks in their homes or offices are not securing them correctly, if at all. Unlike Ethernet networks that require a user to be attached or plugged-into the network, Wi-Fi networks broadcast their signal in all directions, allowing anyone with a wireless adapter to access the network. If you haven’t taken the time to secure your Wi-Fi equipment, you may be sharing your files and Internet connection with your neighbors, or worse, hackers.
There are plenty of wireless books available that address basic wireless networking or the setup of specific products. In this book, I focus on the security and safety consequences of using these devices and try to explain these issues in a manner that’s helpful to new and intermediate wireless users.
I won’t discuss specific brands or provide step-by-step instruction for setting up your access point or router; my goal is to illuminate you about the risks associated with your new wireless equipment and provide some solutions for improving the security on your network. Using this book you’ll learn the following things:
How TCP/IP networks work
How Wi-Fi networks operate
Why wireless technology is insecure
How you are vulnerable
How you can protect your computer and networks
Once you have a basic understanding of the topics covered in this book, I hope you’ll be interested enough to learn more about them. Continued education is one of the most important things that you can do to maintain security of your computer and network.
Whom This Book is For
If you’re an average computer user — beginning or intermediate — and you’ve recently installed your own wireless network, then this book is for you. You don’t need to be a technical guru to benefit from the information I’ve presented inside this book. While a general knowledge of computing and familiarity with basic networking and Internet concepts is desirable, Part I provides an intro to networking that will have you up to speed in no time.
This book is for beginning or intermediate computer users who need a better understanding of the security issues surrounding wireless networks, and how to address them on their own network before they become a victim.
How This Book Is Organized
I’ve divided this book into two parts; each part includes chapters that address a common topic. If you’re relatively new to networking or only have a passing familiarity with TCP/IP and wireless security, I suggest you start in Part I and read the book in order. If you’re in a hurry or concerned that your network may be compromised, you can skip ahead and return to the earlier material later. Here’s how the parts are organized:
Part I: Understanding the Threat —
Part I introduces wireless technology and basic TCP/IP networking. It introduces the security and safety problems associated with wireless networks and with networking in general.
Part II: Protecting Yourself —
In Part II, I discuss the steps you can take to secure your network, protect your equipment from viruses, protect and recover your data, and maintain your privacy. If you’re concerned that your network is not secure, and you already have a grasp of the issues presented in Part I, you can start here.
Appendixes —
The appendixes provide useful resources relating to wireless networks. I’ve also included a glossary of many of the terms I’ve used in this book.
It’s my goal to acquaint you with wireless technology and the related security issues so that you’ll be encouraged to pursue more information and improve your computing knowledge. Wireless networks are here to stay, and I want you to get the most out of them without leaving yourself vulnerable.
Special features and icons
At the beginning of each chapter, you’ll find a short list of the broad topics covered therein. Throughout the text, you’ll encounter icons that I’ve used to bring different topics to your attention. Here’s what each of these icons indicates:
Note Note icons provide important related information about a subject.
On The Web The On the Web icon provides addresses to online resources about a topic.
Caution If I use the Caution icon, I’m warning you about something dangerous where you need to be particularly diligent. I don’t use this icon often, but if you see it please pay close attention to the information.
Cross-Reference The Cross-Reference icon directs you to related information elsewhere in the book.
I hope you find this book useful and informative and that it educates you about wireless networking and security and assists you in securing your wireless network.
Read comments
1 comments:
http://rapidshare.com/files/74072413/Caution__Wireless_Networking_Preventing_a_Data_Disaster_2004.chm
or
http://tinyurl.com/ypawa7
Post a Comment