With the recent explosion in the use of 802.11b networks, the state of network security has been set back over a decade . In many cases, the goal of the attacker is not just to connect to and exploit the wireless network, but also to gain free Internet access or a foothold into the wired network beyond. If you are planning to deploy a wireless network, always put security first. In addition, security managers must implement measures to detect and combat rogue access points and unauthorized clients .
WEP should be used on all deployments of 802.11b networks. This technology, although flawed, will prevent casual interpretation of your network traffic, and will help reduce the number of attacks against it. Although it is possible to crack WEP, the amount of time required to do so, combined with the sheer number of easier-to-crack access points that are not running it, usually causes an attacker to look else-where. However, you should not rely on WEP as your sole measure of security. As always, a traditional layered approach to security is best.
Wireless attacks can be launched by virtually anyone , from virtually anywhere . From the person next to you in the elevator working on her PDA to the occupants of the car driving next to you at 70 MPH on the freeway , all could be hacking your wireless networks at this very moment. If you do not take the necessary precautions to protect yourself, you might as well just give them a key to your office.