Networking Chapter 3: WLAN Security:
Chapter 3: WLAN Security
For most companies, the No. 1 wireless concern is security -- not only keeping 802.11 traffic safe but preventing any wireless LAN from jeopardizing corporate networks, servers and data. Whether your company already has a WLAN, is just starting WLAN deployment, or bans on-campus 802.11 use, a solid understanding of wireless-borne attacks, potential business impacts, and available countermeasures is absolutely essential in order to protect corporate assets from unacceptable risk.
The expert tips in this chapter will help you become familiar with the exposures inherent in wireless and the threats that can be used to attack WLANs, and how adopting a systematic approach of vulnerability assessment and security policy definition can help your company manage associated business risks. You will learn the differences between 802.11 security standards such as WEP, WPA and WPA2, and strategies for successful deployment and migration between these old and new security approaches. You will also discover security best practices that can be used to harden your network against wireless-borne attack, including intrusion detection, prevention, and rogue management.
Wireless security standards:
1 - 3 of 7-
Wireless LAN security: 802.11i
Tip - What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to switch to 802.11i or stick with WPA.
-
Router Expert: Secure WLANs - Understanding the protocols
Tip - This tip reviews the 802.11 architecture and the PHY standards for 802.11a, b, and g and performance expectations.
-
(presented by SearchMobileComputing.com)
Tip - This month Lisa Phifer examines WPA2 and gives us insight into its new security features, fast roaming options and explains how to enable coexistence.
Wireless security strategies:
1 - 3 of 12-
Five steps to stamp out unsafe Wi-Fi use
Tip - Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage.
-
Network Security First-step: Wireless security
Tip - This tip introduces you to wireless LANs (WLANs) and the security risks associated with them.
-
Using VLANs to compartmentalize WLAN traffic
School - Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag and...
Wireless threats and vulnerabilities:
1 - 3 of 7-
Wi-Fi vulnerability assessment checklist
School - Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions.
-
Burton: WLANs safe for everyone
14 Jul 2005
Article - A Burton Group analyst says it's time to cast those enterprise wireless LAN security and management fears aside, and explains why Wi-Fi is finally a viable alternative to wired networks.
-
Tip - This chapter presents an assessment of wireless security with focus on the effective response to three primary issues.
WLAN intrusion detection and prevention:
1 - 3 of 8-
Beyond wireless intrusion detection
(presented by SearchMobileComputing.com)
Tip - Unauthorized devices pose a threat to every WLAN. Learn wireless intrusion detection and prevention systems can help protect your valuable assets.
-
Using your WIDS to monitor WLAN performance
School - "Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to...
-
School - Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.
Network Management Strategies for the CIO