WiFi Network - Technical Vinay

What is WiFi Network: Cyber Attacks and Security

What is WiFi network? That question will come to the mind of the user. WiFi is a wireless networking technology. The full name of WiFi is Wireless Fidelity.

WiFi is a WLAN (Wireless Local Area Network) system. Which allows computers, mobiles, printers as well as video cameras to interface with the Internet.

It makes these devices a network to exchange information with other valid devices.

WiFi defines the 802.11 protocol from a technology standpoint. Which enables messaging with WiFi enabled wireless devices, including wireless routers and WAP.

Wireless access points also support various IEEE standards.

Information of IEEE

The full name of IEEE is Institute of electrical and electronics engineers.

They created and maintained by the LAN / MAN Standards Committee (IEEE 802) of the Institute of Electrical and Electronics Engineers.

From time to time many improvements were made. Each IEEE basis has a specific type of technical improvement.

IEEE standards operate across different frequencies. WiFi also called wireless networking protocol.

Which allows devices equipped with WiFi to exchange information without having to physically connect to a cable.

802.11 an industry term used for a local wireless network protocol based on the IEEE Network Standard.

Wireless is a popular medium for exchanging information between devices in a limited area.

This technology has laid the foundation for the establishment of individual as well as temporary networks.

Type of 802.00

From time to time different standards of WiFi 802.11 (A, B, G, N) came into existence. These standards differed in just two respects. First Data rate and second how far the signal can go

Except for the above two things, all the four standards are the same.

802.11 – A has 6 to 54 mbits / second and a data delivery limit of 120 meters.

802.11 – N has 15 to 150 mbits / second and a data delivery limit of 250 meters.

What is Wireless Access Point in WiFi Network

A wireless access point is a type of networking device. Which allows wireless enabled devices to connect to a wired network.

Provides a kind of complex connections in the network connection of wire and cable.

But it is easier and more convenient to install WAP to connect all the computers and devices in the network.

For Example, After connecting the internet cable coming to our house to the WiFi router, no mobile or laptop needs to be connected to the wire to use the internet.

The most common and best example of a wireless access point is an Internet router installed in your home or office.

Configuration of WAP in WiFi Network

Root Access Point

This access points are directly connected to the wired local area network. Which provides a kind of connection point for wireless users.

If more than one access point is connected to a local area network, users can easily send data without losing their network connection.

Repeater Access Point

Access point in repeater mode extends the range of existing WiFi network. This mode is most suitable when you are in the dead zone of WiFi or in a weak signal area.

Which allows you to get an effective signal range of wireless signal in your home or office.

Bridge

Access points can be configured as root or non-root bridges to connect to multiple networks.

For this the access point will establish a kind of wireless link with the non-root bridge then internet traffic will pass over the wireless link from the wire network.

Work Group Bridge

In this type of connection mode the access point acts as a wireless station. It builds an Internet traffic bridge between a remote wired network or wireless clients and a wireless LAN.

Cyber Attacks on WiFi Network

A secure network gives you the privacy and security of your data. But keeping data safe is becoming more difficult in present time.

It is not enough to use a long password but also to think about how far hackers can reach you.

Using a long password is not enough but you should also consider how can hackers can reach you and steal data. Hackers use a lot of methods.

One way is to attack the WiFi network. Because it can take full control over WiFi and steal data packets sent from your device to the router.

Your data is then stolen by that data packet. Current routers have WAP / WAP2 / WAP3 support but hackers steal.

The data packets obtained by hackers are encrypt but he can easily decrypt this. As well as many software available in the market that help to crack the WiFi password easily.

Types of Cyber Attacks in WiFi Network

Man-in-the-middle (MITM)

This is a kind of cryptographic attack. Which relies on the principle of exchange of information between the two parties without any knowledge as well as exchange if necessary.

The hacker becomes a mediator to steal data. The hacker receives a data packet of the application or website you are browsing.

The user does not even realize that a stranger is between him and the application he is working on.

Denial of Service (DoS)

WiFi network use radio waves so they are extremely sensitive to DoS attacks. The hacker sends the transmission during the DoS attack process.

Which distorts the effectiveness of the network or prevents it from functioning completely. This attack is difficult to avoid.

Also implemented a protection in the form of signal selection on the basis of 802.11 which prevents recording of processes occurring on the same platform.

Another way is to use special wall and window points that are able to block the WiFi signal from leaving the room or building.

The IDS / IPS system is more successful for wireless networks. Which allows the DoS to slow down or stop the attack altogether.

Distributed Denial of Service (DDoS)

This is a kind of updated version of DOS Attack. Which is highly dependent on disabling the service or system using all available resources.

Such attacks are carried out simultaneously by multiple devices. Which is connected to the Internet as well as a remotely operated software system without the user’s knowledge.

Session Hijacking

Session hijacking is also called cookie side-jacking. It is another form of man-in-the-middle (MITM) attack. Which gives the hacker full rights to the user’s account.

The app sets a session cookie when you sign in to a social media or other account. So server identified to the user and open the account.

The server will allow the user to use the application as long as the device holds the session token.

In a session hijacking attack, a hacker steals a user’s session token and uses it to hack an account.

How to Protect Your WiFi Network from Hackers

1 Setting a complex password and restricting access to it

2 Change the password frequently and also change the admin credentials of the router.

3 Strengthen WiFi encryption and keep the router firmware up to date.

4 Turn off plug n play option, turn off remote management and limit WiFi protected setup.

5 It is important to turn on the network firewall and assign static addresses.

6 Turn off WiFi if you don’t need internet. Using a VPN service.

7 It is advisable to center the footprint of the WiFi signal in the center. Create a Faraday cage and set up a separate WiFi network for IoT devices.

Conclusion

The WiFi network blog provides information about WiFi. Information on WiFi usage and precautions has been written. Hope you liked this post.

Also Read

How to Secure Facebook Account

What is Data Science

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top