Wi-Fi Safety
The author of this report has been charged with, after having selected, the subject of Wi-Fi vulnerabilities, what to know about them and what to do about them. While using safe and secure Wi-Fi is not always possible, it is usually possible to use one or more means to avoid having data being compromised as it travels through the air. The issues that will be covered in this report include what protocols are best, what protocols should be avoided, how speeds can come into the calculation and so forth. While dangers exist out there when it comes to using Wi-Fi data, a little preparation and thinking in advance can prevent or at least mitigate a lot of problems.
Questions Answered
The first thing that will be discussed does not have much to do with safety online but it certainly has an effect on productivity and how long it takes, in general, to get work done online. This would be the speed of the wireless internet. The technical standard in question most of the time is what is known as 802.11. There are multiple iterations of standard. It started with the 802.11 standard when Wi-Fi really came into being with the public. This standard was about 10 mbps. After that came G which upped the speed to about 54 mbps. There was a huge jump to N which allowed for, presuming there were multiple channels, speeds of up to 450 mbps. At a minimum, people could get 100+ mbps on a single N connection. Nowadays, there is the blistering fast AC standard which can exceed wireless gigabit (which is no small thing) if the right equipment is involved on the router side and the client side.
Security has also evolved greatly over the years. As the speed has gotten faster, the wireless encryption standards that exist have gotten better or have been completely replaced. One standard that is now obsolete is known as the WEP protocol. The main reason it is no longer used is because it has been "cracked." Meaning, those that detect WEP traffic in the area and decipher what is being communicated because the "key" to translating the encrypted traffic has been figured out. The TJX/TJ Maxx scandal where a ton of credit cards and other sensitive information was stolen was the result of the fact that the stores were using that standard rather than the newer (and still secure) WPA protocol (Chapple, 2015). Nowadays, either WPA or WPA2 are the gold standard protocols when it comes to wireless. There are software-based protocols such as Blowfish and whatnot but WPA/WPA2 is by far the most common wireless standard when it comes to routers, wireless network adapters and so forth (HTG, 2015).
While it may make a lot of sense to have all wireless internet secure, there are some points of access that are not. One of the more common examples would be public Wi-Fi access points. Because encrypted routers and access points require passwords, the encryption is usually turned off unless it is reasonable or practical to give out the password to access the encryption on the router. While having no encryption allows for quicker and easier access, it also means that anything being sent over the air is not encrypted and this means that any "sniffer" or other device designed to catch and read over-the-air content can do so with ease. As such, people have two options when it comes to using unencrypted access points. One is just to make sure that no surfing is done that involves usernames, passwords or private information such as Social Security numbers or credit card numbers. The other way to address this problem is through a Virtual Private Network, or VPN for short. This is a software-based solution whereas communication is encrypted even though it is going over public air. What is done is that a phone or computer connects to the VPN and all content viewed is filtered (and encrypted) through that communication line. In short, so long as someone has VPN access, is using an encrypted router or both, their data should be safe presuming they are using something like WPA or some other protocol that is equally protected at this time. The above is really focused mostly on what happens when one is out and about and does not have access to one's home network (Geier, 2015).
The above lessons also make clear what should happen out in the field. A little...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now