What Security Protocol do You use?
I am going to start by talking about WEP, WPA, and WPA2. These are security protocols that were designed to protect wireless networks. WEP, which stands for Wired Equivalent Privacy. From the name of the protocols sounds like a very secure way to transfer data, however, there are many flaws using WEP. If the user of WEP is constantly do network activity, within seconds can the packet be captured that contains the security key to crack your password. Yes I said within seconds. WPA is a more secure protocol. This protocol uses pre-shared key and Temporal Key Integrity encryption. I will try to explain this for better understanding. WPA uses a different key for every packet that is sent. They share to same pre-shared keys (easy to understand) than each device changes the key. TKIP (Temporal Key Integrity Protocol) is stronger than WEP and used to replaced it without replacing hardware however it is not secure enough for very sensitive data. This is where WPA2 comes in. WPA2 uses a standard called Advanced Encryption Standard (AES for short) in addition to TKIP that adds more security but requires hardware upgrades. AES user a key length of 128, 192, and 256 bits. I will provide a diagram to show you the number of combinations it would take for a hacker to crack a code of this kind of strength. (Diagram provided by
http://www.eetimes.com/document.asp?doc_id=1279619) Written out to visually see that is, bear with me here it's A LOT of zeros! 1,100,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 this is the possible number of combinations to crack a key of 256 bits. Feel free to let me know what that number is if any knows!!
The Properties of my Wireless Network
Since in my previous paragraph I explained WPA2 with the encryption type of AES, I don't have to do much convincing that I have strong security protection of my network. I advice you to check out what kind of security your network has. I will explain how to find your wireless properties.
Click on start and go to your control panel.
Under Network and Internet click on View Network Status and Tasks.
Along the left hand side it will display Control Panel Home. Under that you should see Manage Wireless Networks; Proceed by clicking.
Assuming that the first network on there is your home network, RIGHT click on your network and view properties. (Side note: the other networks listed are ones you have been connected to before, just stored.)
I made the process Windows friendly by color coding. Your results should look similar to mine, depending on your security type and encryption type.
Plucking People Around Me
Instead of choosing a retail business, I decided I would discuss an application I have on my phone. It may be a form of "war driving", however I used with the intentions to show viewers of my blog how easy it is to see what kind of security protocols people use. Or in my case, you will notice one person does not have any protocol in use. I would have drove around with my laptop using a net stumbler program I have install, but unfortunately my laptop isn't so mobile these days. Long story short, the back light is out and it can only work being hooked up to an external device. Anyways, after driving the distance to school and back home from school the results are shocking the number of people who do not secure their networks. 20 miles round trip, within each interval of my Wi-Fi analyzing app. there was at least one network in distance that didn't use any security protocol. If you are to download this app. the results will look different because I did black out the network I am on and everyone's mac address and network name for privacy concerns.
Here is a video link which was watched in the course I'm taking about war driving. War driving is simply searching for wireless networks using a portable, internet capable device. In the video they describe how easy it is to view the networks. They explain the T.J.maxx attack and more.
http://www.cbsnews.com/video/watch/?id=3538299n
Peer 2 Peer File Sharing
Finally, before I finish this post I would let to talk about peer to peer file sharing. If you use file sharing sites, you may think twice after reading this post. Peer-2-peer sites allow users to download and upload music, videos, software, documents, and such. In most cases, they are illegal. I say most cases because using it to upload documents and company videos for other employees is legal. But for the most part they are used to share music, movies, and software illegally. Didn't know what you were doing is illegal or thinking that it is ok because those industries are very wealthy think again. According to the Record industry association of America (
https://www.riaa.com/physicalpiracy.php?content_selector=What-is-Online-Piracy), each year there is more than 70, 000 jobs and 2 billion dollars worth of lost wages due to peer-2-peer sites. Downloading and uploading songs is breaking the law with serious consequences. Since music and movies are copyrighted, it means you are taking property from the owner without that persons permission. Fines for this act can be up to 250,000 dollars and up to 5 years of prison time. Having a felony on your record can destroy aspects of your life, having problems getting a career, living situations, and loans. Please be respectful to the owners and save your future and pay the 1.25 for music on iTunes.
https://www.apple.com/itunes/features/