April 2006

  • Lesson 3 quiz: Who goes there?

    Put your new knowledge of wireless access to the test.

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why...

  • Wireless LANs: Coming soon to an enterprise near you

    Are WLANs ready for enterprise-wide adoption? One wireless expert thinks they are.

  • Measuring ROI from Wireless LANs

    More and more organizations are implementing wireless LANs with the goals of increased productivity and reduced IT and communications costs. But does a wireless LAN deliver positive ROI? The answer...

  • Overlay vs. embedded WIDS sensors

    WIDSs rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIDS use special-purpose sensors, dedicated to this monitoring task. Embedded WIDS use APs to mo...

  • To block or not to block: Rogue containment methods

    Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wir...

  • Recipe for rogue hunting

    Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.

  • Using your WIDS to monitor WLAN performance

    "Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-t...

  • Fighting wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occ...

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This c...

  • Getting from here to there: WPA2 migration

    WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment?...

  • Controlling WLAN access on a tight budget

    WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys,...

  • Using VLANs to compartmentalize WLAN traffic

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilitie...

  • Combining 802.1X and VLANs for WLAN authorization

    Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing use...

  • Choosing the right flavor of 802.1X

    Which of the nearly 50 defined EAP Types would work best in your WLAN? In this tip, we compare the most popular EAP Types used with 802.1X, authentication methods that can be supported by each, kno...

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference l...

  • The ins and outs of AP placement

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security pe...

  • Auditor's office wards off potential wireless threats

    Because of its strict anti-wireless policy, the Washington State Auditor's Office needed a way to ensure that no one inside or outside could tap into the state network wirelessly.

  • Wireless Security Lunchtime Learning Final Exam

    You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained.

  • Wireless network security lunchtime learning

    Whether your company has grown its WLAN organically, officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Lear...