Monday, August 18, 2008

Wireless Router Security

(This post is pending for completion)
Disclaimer
(COMPULSORY TO READ & UNDERSTAND)

Under the Singapore Statutes, Computer Misuse Act Chapter 50A:

*Section 6: Unauthorised use or interception of computer service-
Any person who knowingly secures access without authority to any computer for the purpose of obtaining, directly or indirectly, any computer service shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.

*Section 7: Unauthorised obstruction of use of computer-
Any person who, knowingly and without authority or lawful excuse interferes with, or interrupts or obstructs the lawful use of, a computer; or impedes or prevents access to, or impairs the usefulness or effectiveness of, any program or data stored in a computer, shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.

It's come to my realisation that many Wireless users severely neglect the security of their Wireless Routers, leaving boundless vulnerabilities to hacker attacks. In this post, I'll discuss the various security loopholes in default router configurations. Building upon which, I'll explain how to implement stringent router security, using all available router features.
(To Be Continued...)