Whenever you communicate over the Internet using a wired / wireless connection, you may want to ensure that your communications and files are private and protected. If in case the transmission is not secure, you take the risk of others intercepting your emails, looking in to corporate files and also lead to increase in spamming.
Security is a personal decision, and we encourage all our users to implement some level of security as a deterrent to intrusion.
The most common security procedures are Wi – Fi protected Access, changing your password or network name (SSID) and closing your network. These are very basic levels of security.
Some advanced security procedures:
• Firewalls: Firewalls can make your network invisible to the Internet, and they can block unauthorized and unwanted users from accessing your files and systems. They monitor inflow and outflow of data in all environments, most popularly used in an Enterprise scenario. They can be set to intercept, analyze and stop a wide range of Internet intruders and hackers.
• Wi – Fi gateways and access points provide a built-in firewall capability; But even if they don't, most Wi – Fi gateways include a NAT routing capability that will act as a basic firewall.
• Media Access Control (MAC) Filtering: Under 802.11b standard, every Wi – Fi radio has its unique MAC number allocated by the manufacturer. To increase the wireless network security, program a Wi – Fi access point to accept only certain MAC addresses and filter out the others. The MAC control table acts as a call – blocking in a telephone.
• RADIUS Authentication and Authorization: Remote Access Dial – Up User Service (RADIUS) is another standard technology that is use by major corporate companies to protect their wireless networks. RADIUS is a username and password scheme that allows only approved users to access the network. RADIUS can be set up to provide different access levels or classes of access.
• Encryption: Encryption techniques use special technologies to scramble transmissions on one end and then unscramble them on the other. Other techniques use special keys or codes which enable the computers to talk to each other.