[EN] Wi-Fi network security levelssteemCreated with Sketch.

in hive-175254 •  4 years ago 

Routers can convert the Internet signal that travels through the telephone network (wired or wireless, satellite) into low-frequency radio signals, usually 2.4 GHz, which is the same frequency as many other household appliances such as the oven. microwaves, cordless phones, etc.

A Wi-Fi network not only allows access to the Internet but also the interconnection and transmission of data between the devices that compose it (tablets, telephones, PC, smart-tv's).


Security levels in Wifi networks

If you have had the opportunity to configure a router, surely you have noticed, in the security options, the initials WEP, WPA, WPA-2, SSID, WPS.

WEP (Wired Equivalent Privacy) This was the first security standard and is characterized because its keys or passwords are expressed in "hexadecimal", that is, they use the combination of a set of 16 alphanumeric characters that include: S = {1, 2 , 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F}.

image.png

This security standard was totally hacked and does not represent the minimum level of real security in Wi-Fi networks.


WPA and WPA2 (Wireless Protected Access)

Once the weaknesses of the WEP standard were revealed, a new one called WPA was created, which was also later hacked. It is much more difficult to violate this type of network because it deserves more complex processes but it was also defeated.

Then WPA2 is created. This is a much more secure protocol based on the 802.11 wireless security standard , almost impossible to hack, but with one exception: in 2017 they discovered an attack called "KRACK" (Key Reinstallation Attack) which consists of tricking a member of the network, asking them again to enter the connection password.


SSID (Service Set Identifier) ​​This

is the name of your Wi-Fi network.

There are some Wi-Fi networks that have no name. This option can be configured in the router as a security measure.

This security method adds some complexity to the hacking process, as before passwords are discovered, they must first determine the name of the network. This type of method is called "security by obscurity."


WPS (Wifi Protected Configuration)

We could call it a "physical access" security method. Since it is implemented by pressing a "button" that the router has and that allows adding devices to the network by simply entering an 8-digit PIN code.



La debilidad de este método es que alguien puede acceder al código PIN que generalmente está escrito en la parte inferior del enrutador.


MAC (Media Access Control)

Finalmente, existe un método de seguridad que consiste en agregar las direcciones MAC de los dispositivos que desea agregar a la red en la configuración de acceso del router.

La dirección MAC consta de un código alfa numérico global único (6 bloques de dos caracteres hexadecimales (8 bits)) que funciona como una huella digital de un equipo electrónico, tarjeta o dispositivo de red.

Este método es muy seguro, con la excepción de que si un atacante conoce la dirección MAC de su dispositivo, podría "clonarlo" utilizando un software especializado que implementa una técnica llamada MAC Adress Spoofing .


Conclusión

Each security method for Wi-Fi networks offers a certain level of protection that will vary from one to another. As we can see, some methods are more secure than others, but none of them gives us total security. So if we want to increase the level of protection of our network, we must implement a combination of all these methods. Although it seems exaggerated, there are always people who try to access our data and our personal information, so in terms of privacy there will never be redundant methods.

Cc:-
@steemitblog
@steemcurator01
@steemcurator02
@stephenkendal
@shortsegments

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Sabes perfectamente que plagiaste este post.
Te tomaste la molestia de cambiar algunas imágenes, lo que demuestra la premeditación de tus acciones.

El plagio es el peor acto que puedes cometer en este tipo de comunidades.

Para empeorar tu situación, plagiaste un post de mi autoría. Yo soy el encargado de detectar y sancionar el plagio dentro de Project Hope Community.

Que puedes decir en tu defensa?