-
Recipe for rogue hunting
Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.10 Apr 2006
-
Using your WIDS to monitor WLAN performance
"Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-t...10 Apr 2006
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occ...10 Apr 2006
-
The ins and outs of AP placement
Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security pe...10 Apr 2006
-
Wireless Security Lunchtime Learning Final Exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.10 Apr 2006
-
Auditor's office wards off potential wireless threats
Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.10 Apr 2006
-
Wireless network security lunchtime learning
Whether your company has grown its WLAN organically, officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Lear...10 Apr 2006
-
Wireless Security Lunchtime Learning Entrance Exam
Assess your knowledge of wireless LAN security with this 10-question multiple choice entrance exam.10 Apr 2006
-
Lesson 3: How to implement secure access
In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so you can choose the best method to control, authenticate and authorize...10 Apr 2006
-
Lesson 1 quiz: Risky business
Test your retention of the material taught in Lesson 1 of Wireless Security Lunchtime Learning.10 Apr 2006
-
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast...10 Apr 2006
-
Lesson 4 quiz: I'll be watching you
Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning.10 Apr 2006
-
Lesson 2 quiz: From the ground up
Find out how much you learned in Lesson 2 of Wireless Security Lunchtime Learning.10 Apr 2006
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This c...10 Apr 2006
-
Getting from here to there: WPA2 migration
WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment?...10 Apr 2006
-
Controlling WLAN access on a tight budget
WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys,...10 Apr 2006
-
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilitie...10 Apr 2006
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference l...10 Apr 2006
-
Combining 802.1X and VLANs for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing use...10 Apr 2006
-
Choosing the right flavor of 802.1X
Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, kno...10 Apr 2006
Network Management Strategies for the CIO