Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

< Previous Section: Graphical Firewall Configuration Tools

6 Wireless Linux Security

The saying goes that a chain is only as strong as its weekest link and network security is no exception to this rule. In previous chapters we've looked a number of places where you can improve the level of security of your Linux system. We will now look at another area of Linux security that, if not implemented correctly, will make all the other security precautions ineffective. This is the area of wireless security.

Home and business networks are now increasingly going wireless. This has many benefits primarily in terms of convenience. Wireless networks mean that network cable doesn't have to run wherever a computer needs to be installed and you can get network and internet access anywhere as long as you are within the range of wireless base station. This, for example, gives users freedom to use their laptops in places in a building where there is no network connection available.

There is one big draw back to wireless networks in that they provide another point of security vulnerability in the network. No matter how secure you have made you have made your firewall and your Linux system if you have not also secured your wireless network a hacker can very easily eaves drop and monitor all the traffic on your network to get information such as system passwords and bank account login and password information. Even worse, if your wireless network is wide open intruders can connect to your network and potentially access all of your systems.

Carefully configuring your firewall and Linux system whilst leaving your wireless network unprotected is akin to locking the front door of your house but leaving the windows open.

Fortunately securing a wireless network is straightforward and can be implemented with a few simple steps. In this chapter we will explore the world of wireless security and show you how to ensure your wireless network is as secure is at can be made with current wireless technology.

< Previous Section: Graphical Firewall Configuration Tools

 
 
  © Copyright 2005-2010 Linuxtopia. All Rights Reserved.