We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Security

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Should I Know About Wireless Network Security?

By R. Kayne
Updated: May 16, 2024

Wireless network security is easily put in place using software packaged with the wireless router. It will encrypt all communications on the local network, and will require a password to gain access to the network.

Current routers should come with software that includes second generation WiFi® Protected Access (WPA) security, known as WPA2. Researchers Erik Tews and Martin Beck partially cracked first generation WPA in November 2008. A prior standard, known as Wireless Encryption Protocol (WEP), is no longer considered secure.

A router controls traffic between computers on the local network, and also between the local network and Internet. A broadband modem can be built into the router, or the modem can be separate, connected to the router via an Ethernet cable. Online access is not necessary in a local area network (LAN), but sharing an Internet account is one primary reason for installing a LAN.

In a wireless network each computer on the LAN communicates with the router via radio broadcasts that permeate the immediate area. A LAN broadcast might extend up to 300 feet (~100m) for a 802.11g network, and up to 600 feet (~200m) for a 802.11n network. The “g” and “n” designate different protocols or standards, with the “n” flavor being newer than “g” and more robust.

If wireless network security is absent, an interloper eavesdropping on the broadcast can easily trap any files shared across the LAN. The only transmissions that would be unreadable are direct links between a computers and a secure website on the Internet, as this data would travel encrypted between those two points.

To improve security and privacy, all network traffic between each computer on the LAN and the router can be encrypted using WPA2. With the entire network encrypted, an eavesdropper would be able to see that a network was present, but would not have the credentials to log on to the network. If the interloper were to trap broadcast data packets from such a LAN, they would be in unreadable cipher.

Wireless network security is not only important for protecting privacy, it has other advantages. It prevents hitchhikers from using the LAN for their own purposes, consuming bandwidth and slowing the LAN. It also prevents illegal activity on the LAN by strangers who might use it to download illicit materials, engage in remote attacks, or launch malware. Since setting up wireless network security is a trivial matter, there’s no good reason not to do it.

Within the router’s software there will be a clear path to WPA2 and its settings. Following the instructions includes creating a password for logging into the network. This password will be used in the network configuration menus of every computer on the LAN so that the computer will supply the stored password to the router automatically, allowing access to the network without user intervention. The password should be secure, using small and large case letters, numbers, and other characters.

It is important to note that wireless network security like WPA2 provides LAN encryption only, not Internet encryption. If a request is made to the Internet, for example, that request travels encrypted from the computer in the LAN to the router, but once the router decrypts the request to read it, it sends it on to the Internet unencrypted. The only encryption that takes place between the router and Internet is when a computer is connected to a secure website that provides point-to-point encryption.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Discussion Comments
Share
https://www.easytechjunkie.com/what-should-i-know-about-wireless-network-security.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.