In recent years, DO-IT Scholars have been loaned laptop computers with wireless networking capability. This relatively new technology is convenient but with this convenience comes some risk to personal information. This article introduces some precautions that users should take to maintain the privacy of confidential information.
In the "old days" all networks of computers had hard-wire connections. Only those within the physical environment could access data on the machines. When those machines were linked to networks via modems, then other machines with modems gained access. Steps were taken to keep data private including the assignment of username/password pairs as well as other methodologies that most people have taken heed of to practice safe computing.
Wireless "hotspots" are widely available in many cities throughout the world. In these locations a wireless hub is hardwired to the Internet and allows for users in range of the wireless signal to share that connection. Some are accessible free of charge while others require an account to proceed with a connection to the Internet. In either case it appears to be magic that you sit in a café or airport and surf the web free of wires and modems.
Years ago, the first networks were created based on trusted relationships between researchers. When a data packet came flowing through the wires it would roughly say, "Data delivery for network card A. Are you card A?" All other network cards would answer back, "Nope, I'm not card A," and the data would keep flowing until it found card A.
Employing a "sniffer" program would enable the network card to operate in a way that broke these rules of trust not to read data not meant for that machine. This software would take in all data flowing through the network, sort through it, and then pass it on to the network. This brought about the use of new communication practices so that confidential information traveled in encrypted format while other material went in plain text.
Where those employing sniffers used to need physical access to your network, with wireless technology intruders with sniffer programs can be sitting across the café from you or in a van outside your home or office. These folks employ a few common methods to gain access to your personal data. Some techniques you can employ to keep them at bay are described below.
In a trust-based internal network you can enable file sharing to allow others in your family or workplace access to files in one or all of the folders on your computer. This spares you having to send files back and forth. A minimal protective measure is to password-protect folders so that only a limited group of users on the network can access them. This security is not foolproof as cracking tools exist to gain access to password-protected files.
When you use a wireless network connection, shared folders are available to anyone else on the same wireless network. It is important to disable file sharing when using such networks. To do this, you typically take steps such as these that follow.
Any time you're connected to the Internet you should employ a firewall. Otherwise, intruders can make use of various ports and protocols to send data to or take data from your computer. Real threats may be occurring while you are completely unaware until the damage is done.
Having your computer updated to Microsoft XP™ service pack 2 enables Microsoft's internal firewall.
One method used by those attempting to steal your personal data is to employ technology that tricks you into thinking you're connecting to your intended wireless access point while instead you're connecting to their machine and then to the Internet. They'll broadcast their availability with a name that looks like your intended access point. If the legit connection is with "Starbucks WiFi" they may broadcast as "StarbucksWiFi" (note the missing space in the name) or something similar enough that you'd choose that in the list of available access points without noticing the danger.
One method used by those attempting to steal your personal data is to employ technology that tricks you into thinking you're connecting to your intended wireless access point while instead you're connecting to their machine and then to the Internet. They'll broadcast their availability with a name that looks like your intended access point. For example, the legitimate connection is with "Starbucks WiFi" they may broadcast as "StarbucksWiFi" (note the missing space in the name) or something similar enough that you may choose that in the list of available access points without noticing the danger.
A convenient option is to have your wireless card automatically connect to an available wireless access point. This saves you a few steps at home or at work when getting online. The downside of an automatic connection is that you may end up connecting to a rogue access point, otherwise known as an "evil twin."
To make sure that the automatic connection feature is turned off, follow steps similar to those listed below:
In ad-hoc mode, wireless devices communicate with each other automatically in a peer-to-peer manner without going through some centralized access checkpoint. To make sure this feature is turned off, take steps similar to those that follow:
Computers have enhanced our ability to communicate and create. As technology advances our options multiply. Wireless networking gives us the opportunity to carry on these pursuits in various locations, increasing our productive time and our connectedness. By applying some simple guidelines we can enjoy the convenience without sacrificing the security of our personal and proprietary information.