IFSECInsider-Logo-Square-23

Author Bio ▼

IFSEC Insider, formerly IFSEC Global, is the leading online community and news platform for security and fire safety professionals.
May 5, 2009

Download

Whitepaper: Enhancing security, resilience and efficiency across a range of industries

86% of Indian wireless networks ‘vulnerable’, says Deloitte

Recent high-profile exploits of unsecured wireless networks in India revealed that a substantial proportion of wireless networks were deployed without basic security measures, indicating a general lack of wireless security awareness at a national level.

With the increasing popularity networks, the need to be adequately protected against threats becomes paramount. However, limited awareness about the risks of using unsecured or poorly secured wireless network devices, coupled with the widespread availability of affordable wireless networking equipment has exposed users to potential misuse of these unsecured wireless networks.

With a view to increasing wireless network security awareness among the public, the Enterprise Risk Services division of Deloitte Touche Tohmatsu India Private Limited (Deloitte India) released recently a first of it kind “Wireless Security Survey,” in association with Data Security Council of India, with a focus on the Mumbai metropolis in October 2008.

A booklet providing systematic details to secure commonly used wireless network equipment was also released simultaneously.

WarDriving technique

By extending the survey to other cities in the country, Deloitte India has attempted to highlight the state of wireless network security on a nation-wide basis. The survey was carried out using the WarDriving technique. Deloitte India believes that increasing end user awareness and making a conscious decision to secure networks will go a long way towards the goal of making India ‘Wi-Fi secure.’

The nation-wide WarDrving method undertaken by Deloitte India in October 2008 revealed that 86 per cent of observed wireless networks appeared to be vulnerable. Configuration errors like using manufacturer-default device names that reveal business of personal details and the use of weak encryption expose such networks to a greater risk of unauthorised access.

During the WarDriving exercise covering 12 cites across India, it was observed that existed a total of 35,860 wireless networks and classified them under two broad categories – Vulnerable and Protected networks. It was observed that 89 per cent of the total networks covered in India appeared to be vulnerable, since 37 per cent of these networks appeared to have no encryption and 49 per cent of the networks appeared to be using wired equivalent privacy (WEP) encryption. WEP is generally considered to offer low level of protection, whereas Wi-Fi protected access (WPA and WPA2) is generally considered to offer a high level of protection.

Non-use of SSID

It was observed that approximately 7 per cent of wireless networks across survey cities were not broadcasting their service set identifier (SSID). Based on their SSID nomenclature of balance 93 per cent wireless networks, it was classified into three categories – business, residential and networks broadcasting manufacturer-default SSIDs.

Business and residences are increasingly turning to wireless networks because of the convenience their offer. It was seen that 33, 523 networks were broadcasting their SSIDs, of which 24, 711 appeared to be either business or residential.

The rapid adoption of wireless networks without a commensurate increase in wireless network security awareness, both at homes and at businesses, is indeed a growing concern.

The survey listed out some of the risks associated with unsecured use of wireless networks.

– Unauthorised users might visit objectionable sites, send threatening mails and download or post offensive material on websites.

– Illegal activities might be performed from the owner’s unsecured network.

– If folders are shared over the wireless network, they may be available to unauthorised users

– If the wireless network is connected to the internet, it would be possible for intruders to surf net free of charge. Not only would that clog the network but also consume upload and download limits.

– Unauthorised users may sniff sensitive data such as bank account details, online transaction passwords and email communication.

Best pracrices

The survey also came with a list of good practices to help improve wireless security:

– Give priority to updating the equipment firmware (code that is stored in read-only memory).

– Enable encryption, to protect the data that is being transmitted. Opt for WPA, preferably WPA2, rather than WEP.

– Turn off SSID broadcasting. Service Set Identifier a sequence of letters or numbers that constitutes the name or ID of the network. Most wireless access points have a way of broadcasting their identity and these can be used to hack into vulnerable networks.

– Change the default SSID. The default SSID is set by the manufacturer and this should be changed to a unique one but not contain any personal information that could possibly be misused.

– Change the default password – use a strong one. Wireless access points may be using default passwords, which are known to hackers.

– Enable MAC address filtering. Media Access Control Address is usually a unique sequence of numbers and letters assigned to your networking hardware.

– With filtering, you can choose the computers that are allowed to access your network.

– Also, remember to turn off the access points when they are not in use.

– In addition, do not assume that public hotspots are secure ones.

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments