Wifi Networks Security Levels

avatar
(Edited)

A Wifi network (Wireless Fidelity), consists of a connection environment, generally with Internet access that we can achieve through the use of electronic devices called routers.

Routers can convert the Internet signal that travels over the telephone network (wired or wireless, satellite) into low-frequency radio signals, generally, 2.4 GHz, which is the same frequency as many other household appliances such as the oven. microwave, cordless phones, etc.

A wifi network not only allows access to the internet but also the interconnection and transmission of data between the devices that make it up (tablets, phones, PCs, smart-tv's).


Security levels in Wifi networks

If you have had the opportunity to configure a router, surely you have noticed, in the security options, the initials WEP, WPA, WPA-2, SSID, WPS.

image.png

WEP (Wired Equivalent Privacy)
This was the first security standard and it is characterized because its keys or passwords are expressed in "hexadecimal", that is, they use the combination of a set of 16 alphanumeric characters that include: S = {1,2,3,4,5, 6,7,8,9, A, B, C, D, E, F}.

image.png
Source

This security standard was totally hacked and does not represent the minimum level of real security in Wi-Fi networks.

image.png

WPA and WPA2 (Wireless Protected Access)
Once the weaknesses of the WEP standard were revealed, a new one called WPA was created, which was also hacked later. It is much more difficult to violate this type of network because it deserves more complex processes but it was also defeated.

Then WPA2 is created. This is a much more secure protocol based on the 802.11 wireless security standard, almost impossible to hack, but with one exception: In 2017 they discovered an attack which was called "KRACK" (Key Reinstallation Attack) which consists of deceiving a member of the network, asking them again to enter the connection password.

image.png

SSID (Service Set Identifier)
It is the name of your wifi network.
There are some wifi networks that have no name. This option can be configured on the router as a security measure.

image.png

This security method adds some complexity to the hacking process since before the passwords are discovered they should first determine the name of the network. This type of method is called "security by darkness".

image.png

WPS (Wifi Protected Setup)
We could call it a "physical access" security method. Since it is implemented by pressing a "button" that the router has and that allows adding devices to the network just by entering an 8-digit PIN code.

image.png
Source

The weakness of this method is that someone can access the PIN code which is usually written at the bottom of the router.

image.png

MAC (Media Access Control)
Finally, there is a security method that consists in adding the MAC addresses of the devices that you want to add to the network in the router's access configuration.

image.png

The MAC address consists of a unique global numeric alpha code (6 blocks of two hexadecimal characters (8 bits)) that functions as a fingerprint of electronic equipment, card, or network device.

This method is very safe, with the exception that if an attacker knows your device's MAC address, he could "clone" it using specialized software implementing a technique called MAC Adress Spoofing.

image.png

Conclusion

Each security method for Wi-Fi networks offers a certain level of protection which will vary from one to the other. As we could see, some methods are safer than others, but none of them gives us total security. So if we want to increase the protection level of our network we should implement a combination of all these methods. Although it seems exaggerated there are always people trying to access our data and our personal information, so in terms of privacy there will never be redundant methods.

image.png


@juanmolina


image.png

image.png
Vive la experiencia BraveBrowser. Navegue rápido y seguro mientras gana tokens BAT.
Por favor descargue el navegador Brave usando mi Enlace de Referencia.




0
0
0.000
12 comments
avatar

Very good information in this post, I see that you use brave how are you doing with that? they sent me a BAT once

0
0
0.000
avatar

I have received BAT from them on several occasions.
I have been able to convert them to dollars and sell them. Using uphold.

0
0
0.000
avatar

In my region, I earn only about $2 per month after using the Brave Browser several hours a day, every day. For me, that is a poor reason to give up a lot of your privacy (to Uphold) just to receive the small reward.

This is my opinion based on my experience. Thanks for reading.

0
0
0.000
avatar

The rewards for looking at advertising are quite low. But let's think about it, our effort is minimal in this regard. We should only use our browser routinely and eventually, a small advertising notification window will open, which we will see only if we decide to do so.

I have received the highest number of BATs through the referral system. This gives us the opportunity to earn considerable rewards by sharing our links and getting other people to join the brave experience.
If you want you can see this article of mine:

How Was My 2019 Using Brave Browser? - 180 BAT in Earnings!!!

c.c: @ramsesuchiha.

0
0
0.000
avatar

I am a user of Brave Browser. The only thing I dislike is their BAT rewards system, where you are required to submit proof of identity to Uphold, which defeats the purpose of Brave's privacy in the first place. So, I just donate my earned BAT to the websites I visit because I can't withdraw them without identity verification.

I hope Brave replaces Uphold with something that allows you to withdraw BAT without giving up a lot of your privacy.

0
0
0.000
avatar

Thank's for information to bad for brave, and for us

0
0
0.000
avatar

I have been using Uphold since before using Brave.
I like uphold, I consider that it offers a great quality service, although its exchange rates are a little higher than the rest.
I always saw the brave-uphold fusion as a successful move, I never saw it as an invasion of privacy. I will have to think about it.

0
0
0.000
avatar
(Edited)

Pretty decent WiFi security tips. Just to point out that WEP, WPA and WPA2 are all WiFi encryption standards or protocols. SSID, WPS and MAC are separate concepts altogether.

I cross-posted this to my Cybersecurity community if you don't mind 😅

0
0
0.000
avatar

Certainly, they are of a different nature although they can all work as methods to add security to our Wi-Fi networks.

I cross-posted this to my Cybersecurity community if you don't mind

Feel free to do it, in fact, you would honor me with this.
Thanks.

0
0
0.000