IB Standards Covered:
3.1.15 Describe different methods of wireless network security
3.1.16 Discuss the advantages and disadvantages of each network security method
There are a variety of ways in which you can keep your network secure. The chart below provides an overview of the advantages and disadvantages of each method.
Advantages | Disadvantages | |
Install an antivirus program on your device. | Provides protection from malicious downloaded files. | May slow down your device |
Use a software firewall installed on each device. | It will monitor and control the traffic flow between your computer and the network and prevent unauthorized access to your device. | May slow down your device |
Limit access to wireless devices by MAC address | Extra security by having a whitelist of allowed devices. Each device has a unique MAC address found on the Network Interface Card(NIC) | The list can easily be sniffed with appropriate software. The list may be hard to manage. |
WEP Wireless Security | Works with legacy systems | Outdated and not secure. |
WPA/WPA2 Wireless Security | The best and most recommended option. | |
Wireless Protected Setup | Easy to use as no passwords are needed. | Only works with WPS certified devices. There are some known security issues. |
Use a firewall | Prevent attackers from accessing your network over the internet. | Physical proximity will allow access to the network. |
Encryption software for information being sent over the internet. | Very difficult to decrypt, making it very secure. | The process can be a bit complicated. |