-
Lesson 3 quiz: Who goes there?
Put your new knowledge of wireless access to the test.10 Apr 2006
-
Defeating Evil Twin attacks
Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why...10 Apr 2006
-
Wireless LANs: Coming soon to an enterprise near you
Are WLANs ready for enterprise-wide adoption? One wireless expert thinks they are.10 Apr 2006
-
Measuring ROI from Wireless LANs
More and more organizations are implementing wireless LANs with the goals of increased productivity and reduced IT and communications costs. But does a wireless LAN deliver positive ROI? The answer...10 Apr 2006
-
Overlay vs. embedded WIDS sensors
WIDSs rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDS use special-purpose sensors, dedicated to this monitoring task. Embedded WIDS use APs to mo...10 Apr 2006
-
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wir...10 Apr 2006
-
Recipe for rogue hunting
Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.10 Apr 2006
-
Using your WIDS to monitor WLAN performance
"Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-t...10 Apr 2006
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occ...10 Apr 2006
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This c...10 Apr 2006
-
Getting from here to there: WPA2 migration
WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment?...10 Apr 2006
-
Controlling WLAN access on a tight budget
WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys,...10 Apr 2006
-
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilitie...10 Apr 2006
-
Combining 802.1X and VLANs for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing use...10 Apr 2006
-
Choosing the right flavor of 802.1X
Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, kno...10 Apr 2006
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference l...10 Apr 2006
-
The ins and outs of AP placement
Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security pe...10 Apr 2006
-
Auditor's office wards off potential wireless threats
Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.10 Apr 2006
-
Wireless Security Lunchtime Learning Final Exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.10 Apr 2006
-
Wireless network security lunchtime learning
Whether your company has grown its WLAN organically, officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Lear...10 Apr 2006
Network Management Strategies for the CIO