Wireless LAN Vulnerabilities? Threats and Countermeasures
Table Of Contents
Introduction4
Wireless Vulnerabilities? Threats and Countermeasures5
Wireless Network Attacks Accidental association6
Malicious association6
Ad-hoc networks7
Non-traditional networks7
Identity robbery (MAC spoofing)8
Man-in-the-middle attacks8
Denial of service9
Network injection10
Caffe Latte attack10
Securing Wireless Transmissions10
Protecting the Confidentiality of Wireless Transmissions11
Signal-Hiding Techniques11
Encryption12
Preventing Alteration of Intercepted Communications12
Countermeasures to Reduce the Risk of Denial-of-Service Attacks12
Securing Wireless Access Points13
Countermeasures to Secure Wireless Access Points13
Eliminate Rogue Access Points13
Secure Configuration of Authorized Access Points14
Use 80x to authenticate all Devices14
Securing Wireless Client Devices14
Securing Wireless Networks15
Use of Encryption15
Use anti-virus and anti-spy ware programs? and a firewall15
Turn off identifier broadcasting16
Change the identifier on your router from the default16
Change your router's pre-set password for administration17
Allow only exact computers to get access to your wireless network17
Turn off your wireless mesh when you understand you won't use it17
Don't suppose that public "hot spots" are secure18
Training and Educating Users18
Network Auditing18
Conclusion19
Wireless LAN Vulnerabilities? Threats and Countermeasures
Introduction
Wireless networking presents numerous benefits Productivity advances because of expanded accessibility to data resources. Network configuration and reconfiguration is simpler? much quicker? and less expensive. However? wireless expertise furthermore conceives new risks and adjusts the living data security risk profile. For demonstration? because communications takes location "through the air" utilising wireless frequencies? the risk of interception is larger than with connected networks. If the note is not encrypted? or encrypted with a feeble algorithm? the attacker can read it? thereby compromising confidentiality. Although wireless networking adjusts the dangers affiliated with diverse risks to security? the general security objectives stay the identical as with connected networks: maintaining confidentiality? double-checking integrity? and sustaining accessibility of the data and data systems. The target of this paper is to aid managers in making such conclusions by supplying them with a rudimentary comprehending of the environment of the diverse risks affiliated with wireless networking and accessible countermeasures.
The attractiveness of wireless Networks is a testament mainly to their convenience? cost effectiveness? and alleviate of integration with other systems and mesh components. The most of computers traded to buyers today arrive pre-equipped with all essential wireless Networks technology. The advantages of wireless Networks include: Convenience? Mobility? Productivity? Deployment? Expandability and Cost.
Wireless Network expertise? while replete with the conveniences and benefits recounted overhead has its share of downfalls. For a granted networking position? wireless Networks may not be attractive for a number of reasons. Most of these have to do with the inherent limitations of the technology. The handicaps of utilising a wireless mesh are:
Security? Range? Reliability? and Speed.
Wireless Networks present an owner of matters for mesh managers. Unauthorized get access to points? broadcasted SSIDs? unidentified positions? and spoofed MAC locations are just a couple of the difficulties addressed in WLAN troubleshooting. Most mesh investigation vendors? for example Network Instruments? Network General? and Fluke? offer WLAN troubleshooting devices or functionalities as part of their merchandise line.
Wireless Vulnerabilities? Threats and Countermeasures
The wireless systems comprise of four rudimentary components: The transmission of facts and numbers utilising wireless frequencies; Access points that supply an attachment to the organizational mesh and/or the Client apparatus (laptops? PDAs? etc.); and ...