If you’re planning to move to a wireless connection in your home, take a moment to consider what you’re doing: You’re connecting a device to your DSL or cable modem that broadcasts your internet connection through the air over a radio signal to your computers. If traditional wired connections are prey to security problems, think of the security problems that arise when you open your internet connection to the airwaves. The following sections describe some of the threats to home wireless networks.
Piggybacking:
If you fail to secure your wireless network, anyone with a wireless enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 to 300 feet. Of course in outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could potentially open your internet connection to a surprising number of users. Doing so invites a number of problems:
Wardriving:
Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this wireless network range, and some have made a hobby out of driving through cities and neighborhoods with a wireless equipped computer sometimes with a powerful antenna searching for unsecured wireless networks. This practice is nicknamed as “wardriving.” Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the “Piggybacking” section above.
Unauthorized Computer Access:
An unsecured wireless network combined with unsecured file sharing can spell disaster. Under these conditions, a malicious user could access any directories and files you have allowed for sharing.
Piggybacking:
If you fail to secure your wireless network, anyone with a wireless enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 to 300 feet. Of course in outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could potentially open your internet connection to a surprising number of users. Doing so invites a number of problems:
- Service violations: You may exceed the number of connections permitted by your internet service provider.
- Bandwidth shortages: Users piggybacking on your internet connection might use up your bandwidth and slow your connection.
- Abuse by malicious users: Users piggybacking on your internet connection might engage in illegal activity that will be traced to you.
- Monitoring of your activity: Malicious users may be able to monitor your internet activity and steal passwords and other sensitive information.
Wardriving:
Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this wireless network range, and some have made a hobby out of driving through cities and neighborhoods with a wireless equipped computer sometimes with a powerful antenna searching for unsecured wireless networks. This practice is nicknamed as “wardriving.” Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the “Piggybacking” section above.
Unauthorized Computer Access:
An unsecured wireless network combined with unsecured file sharing can spell disaster. Under these conditions, a malicious user could access any directories and files you have allowed for sharing.