Table of Contents (linked to section)
1. Background
1.1 Radio Waves
|
1.1.1 Wi-Fi
Wi-Fi uses radio signals to transmit information from your Wi-Fi embedded devices and the internet, allowing the device to receive the information from the web the same way that a radio or mobile phone receives sound. Internet data can be transmitted through a LAN, hardwired connection, or wirelessly using Wi-Fi.
|
1.1.2 Signal Attenuation
The easiest and most consistent way to express signal strength is in dBm, which stands for decibels relative to a milliwatt.
dBm = Decibels in relation to a milliwatt (-30 to -100)
1.1.3 Requirements & VariablesStrength for optimal/desired performance is based on factors including:
1.1.4 Ideal StrengthFor low-throughput tasks (sending emails, browsing web, etc.) -70 dBm is a good signal strength. For higher-throughput requests like video streaming, -67 dBm is better, and some engineers recommend -65 dBm if you are planning on using mobile phones or other devices.
|
1.1.4 Frequency
1.1.4.1 2.4 GhZ vs. 5 GhZ
|
1.2 Wireless Antennae
An antenna is a transducer that converts radio frequencies (RF) fields into alternating current or vise versa. Antennas play an important role in the operation of all radio equipment.
|
1.2.1 Dipole Antenna
1.2.2 Directional Antenna
1.3 Data Transmission
The process of sending or receiving digital or analog data over a communication medium to one or more computing, network, communication, or electronic devices.
|
1.3.1 Client
The receiving end of a service or the requester of a service in a client/server system.
|
1.3.2 Access Point (AP)
A networking hardware device that allows a Wi-Fi, or IoT (Internet of Things) device, to connect to a wired network.
|
1.3.3 Node
A connection point that can receive, create, store, or send data along distributed network routes (data spread over more than one computer).
|
2. Problem
2.1 Cybercriminals
Individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, typically with the goal of making a profit.
|
2.2 Cyber Attacks |
The most common types of cyber attacks include:
|
2.2.1 ExploitsMalicious payloads are the parts of cyber attacks which cause harm. Malicious payloads can sit dormant on a computer or network for seconds or even months before they are triggered. Other payloads can be script injection into a computer network to reveal confidential information.
|
2.2.2 Payloads |
The payload is what causes the exploit to run. If an exploit is a piece of code written to take advantage of a particular vulnerability, the payload is the piece of code to be executed through said exploit. This being said, viruses with more powerful payloads, such as Wi-Fi Eavesdropping/Sniffing, tend to be more harmful.
|
2.2.3 ProfitCyber crime is a very high-paying job, but obviously comes with a high risk. According to the Bromium Report on how much cybercriminals make from performing cyber attacks, high earners make up to $2 million per year. Mid-level criminals make up to $900,000, and entry-level criminals make up to $42,000.
|
2.3 Small Business Risk
|
2.3.1 Why SMBs Are At Risk
Small businesses are most at risk because the staff is typically prone to falling for social engineering attacks due to a general lack of cybersecurity training, and releasing confidential information, by accident. Many small business employees also tend to not use the most secure passwords, and even using the same password for all of their services. Finally, small businesses are most at risk for cyber attacks because 93% of small businesses have no dedicated Cybersecurity/Network Administration staff.
|
2.3.2 Social EngineeringSocial engineering is the art of manipulating people, like employees of a business, to give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted, the criminals are usually trying to trick you into giving them your passwords, bank information, or access your computer to secretly install malicious software.
|
2.3.3 Employee TrainingEmployee cybersecurity awareness training can be very beneficial to protect against social engineering attacks. This training aims to equip your employees with the knowledge and skills they need to protect themselves and your business from cybercriminals and their malicious attacks. This being said, it is highly recommended that any employee with access to a work-related computer or mobile device should undergo cybersecurity awareness training.
|
2.4 Network Security
Current cybersecurity solutions and services for small businesses are limited to:
|
3. Solution
3.1 Radio Frequency EngineeringRadio Frequency (RF) engineering is a subset or electrical/electronic engineering involving the application of transmission line, waveguide, antenna and electromagnetic field principles. As RF signals travel through the air, they can move and behave in a wide range of behaviors including:
RF engineering explores the many factors that affect RF signals, and designs & implements technologies in order to accomplish their goal.
|
3.2 RF-Shielding FabricRadio Frequency-shielding fabric is a material similar to cloth fabric, except it is made out of a conductive material, mainly thin strands of metal that are microscopically woven together. This conductive enclosure is used to block electrostatic fields and radio frequency signals by creating a "Farraday cage" around the enclosed area.
|
3.3 Object InterferenceBecause wireless (RF signals) travel through the atmosphere, they are very susceptible to different types of interference than standard wired networks. Interference weakens wireless signals and therefore is an important consideration when working with wireless networking. Physical objects such as trees, masonry, buildings, and other physical structures are some of the most common sources of physical interference. The density of the materials used in a building's construction determines the number of walls the RF signal can pass through, and still maintain adequate coverage.
|