One of the fastest growing segments of Internet connectivity today is Wireless Internet. Wi-Fi, or Wireless Fidelity, is Internet connectivity over dual band networks that are classified by a set of standards most commonly referred to as 802.11, 802.11a, and 802.11b. Although there are several other standards, these three are the most common at this time. Access over these types of networks is available in most major cities in the United States, and the technological standards used to define Wi-Fi access are in use in many other countries.
The 802.11 standards can be classified by several unique features, as well as the potential speed available. 802.11a and 802.11b are currently considered the two fastest wireless network standards offering uploads up to 11mbps and downloads at a brisk 54mbps. Clearly these speeds can compete with any satellite or DSL Internet offering, and many cable services are significantly slower.
The convenience and ease of use of Wi-Fi connectivity also comes with several security issues. Along with the standard security concerns inherent in a wired connection, data sent and received via a wireless connection can be intercepted and received almost anywhere within a given range. With the introduction of Wired Equivalent Privacy, or WEP, encryption has become a standard security measure with almost every wireless high speed internet connection. Even with a WEP key in place the wireless data can be captured, it is simply unlikely that the information would be useful. Of course a determined hacker could eventually access the data, but this would be the exception not the rule.
A more common Wi-Fi security problem is referred to as an Evil Twin Attack. This type of attack takes place when a hacker hijacks a wireless network signal. The hijacker creates a wireless access point in their own laptop computer, basically offering a wireless network to anyone within range of their signal. The hacker then enters a popular wireless access area such as a coffee shop or mall and makes their network available. When a user tries to log into the network offered by their favorite coffee shop, it is possible they mistakenly choose the hacker’s wireless access point. This is a way a hacker can bypass many security measures often including encryption. Every packet of data sent or received via an Evil Twin is available to the hijacker. There are several security measures that can be taken to avoid an Evil Twin attack as well as other dangers. These include: