-
Essay / Wireless Network Technology – 2028
IntroductionWireless network technology is the fastest growing sector of the communications market. An organization is adopting wireless networking technologies to meet the ever-increasing network requirements (Whitman, ME & Mattord, HJ 2005). Wireless networks have demonstrated their ability to provide increased productivity, convenience and freedom of movement for users and network installation flexibility for organizations' IT staff. Thanks to wireless networks, computer users have become more mobile. It is not necessary for users to be near the connection point to use the Internet (Solms, BV & Marais, E 2004). However, wireless technology also creates new threats and changes the existing information security risk profile. Securing a wireless network is crucial if we want to prevent unauthorized users from accessing our data and downloading material. Nowadays, data and asset theft via the Internet has become very common. So it is important to secure the wireless network using the little time to save in the future. Wireless network security is becoming more vital as it is the most commonly used in every field. There are a number of practices developed so far to secure wireless networks, and due to their scope and importance, more and more research is being done for more secure wireless networks in the future ( Solms, BV & Marais, E 2004). Wireless network security1. Basics of Wireless NetworkingAccording to (Vacca, JR 2006) The term wireless networking refers to the technology that allows two or more computers to communicate using standard network protocols, but without network cabling. Not so long ago, computers were a luxury rather than a necessity. Have a computer...... middle of paper ...... network servers are maintained by KDC.4.5 PEAP, LEAP and EAPPEAP are developed by RSA Security, Cisco and Microsoft. PEAP allows secure data transfer, transport of encryption keys and passwords without involving a server certificate. PEAP is designed to protect EAP communication between clients and authenticators. LEAP is the lightweight extensible authentication protocol. It is based on 802.1X and to reduce the original security flaws, it uses WEP and a sensitive key management system. LEAP is very secure unlike EAP-MD5. It is prone to cracking. There are crackers for breaking LEAP, such as the THC-Leap cracker, Anwrap and Asleared (Rittinghouse, JW & Ransome, JF 2004). LEAP presented a practical way to provide mutual authentication between a RADIUS client and server while authentication standards for use in wireless environments were still rapidly evolving.