You are here: Wireless Security Technology > Overview
The Ethernet frame is practically the same when it travels over copper media regardless of the speed (10,100 or 1000Mb). We must note something very important: This frame in turn is encapsulated in a different container when it is going to be traveling over the WAN, or air as the media. Just picture this: To take pictures with your camera below the sea you must protect it (encapsulate it) with the proper apparel.
Up to this point, we have not mentioned anything about security. In those years the main objective was to share data and connect very small groups of people. To come up with an Ethernet network in those years, basically all that was needed was a coaxial cable and you could clamp on with the computer’s NIC to the cable. In those days, no attention was given to interweaving security into the Ethernet frame; the means for ensuring that information would be seen only by the recipient were never developed. In present time, to ensure interoperability of different types of equipment, the Ethernet frame is basically the same, but the security might be build around the frame, or the frame itself is encrypted as it travels on the media; and then it is unencrypted at the endpoint.
Let us look at one particular transmission media: the air. We see the same beginnings: wireless networks simply broadcast information. The encapsulation of the Ethernet frame was done in such a way just to ensure it could travel without damage or to be repaired to some extent when it was received in the other side. Later on this became fairly inconvenient, because anybody with the proper gear could just listen, and pick up the information and reconstruct whatever information was being sent over the air. All that followed in regards to wireless technologies as the years passed (WEP, WPA, VPNs) are the means to secure that frame as it travels in radio waves over the air, to ensure that the contents are not viewed by anybody else. All of the different security technologies have strengths and weaknesses, and the intention is to give an understanding of what can be achieved with each technology.
Moving fast forward on our history tape, the Ethernet frame later on began to carry another protocol, called TCP/IP. TCP/IP is now the protocol that carries the Internet world wide. TCP/IP is very versatile, because it can be encapsulated inside an Ethernet frame, Bluetooth protocol frames, or Wi-Fi frames, IPSec frames, etc.
Think about the last comment: VoIP is one of the fairly new types of data carried by the TCP/IP packet. You can have a phone number listed in San Antonio TX, and receive calls and dial from Mexico City, and all phone charges will be the same as if the person were actually living in San Antonio. With prices dropping for desktops and laptops, high-speed Internet access, and wireless hardware products, today's consumers enjoy the convenience of wireless access at home. They find the experience liberating and want this service to be available everywhere: in schools, the office and on the road.
|
Implementing multilayer WLAN security is not easy. While progress has been made developing security standards for wireless networks, administrators must constantly ensure that it is comprehensive, effective, and proactive.
The Global Wireless Education Consortium estimated that 300,000 workers with wireless knowledge were needed in 2005. According to JobBank USA, demand for computer security specialists will grow as businesses and government continue to invest in protecting their networks infrastructure from attack. Robert Half Technology, an IT recruiting firm, surveyed 1400 Chief Information Officers and found wireless networking to be a skill in demand. Thus a program such as this one where students are not only trained in the use of specific technical skills, but also acquire the knowledge of how information is used by organizations and the importance of protecting it, address both academic and business goals.