Networking Chapter 3: WLAN Security:

Chapter 3: WLAN Security

For most companies, the No. 1 wireless concern is security -- not only keeping 802.11 traffic safe but preventing any wireless LAN from jeopardizing corporate networks, servers and data. Whether your company already has a WLAN, is just starting WLAN deployment, or bans on-campus 802.11 use, a solid understanding of wireless-borne attacks, potential business impacts, and available countermeasures is absolutely essential in order to protect corporate assets from unacceptable risk.

The expert tips in this chapter will help you become familiar with the exposures inherent in wireless and the threats that can be used to attack WLANs, and how adopting a systematic approach of vulnerability assessment and security policy definition can help your company manage associated business risks. You will learn the differences between 802.11 security standards such as WEP, WPA and WPA2, and strategies for successful deployment and migration between these old and new security approaches. You will also discover security best practices that can be used to harden your network against wireless-borne attack, including intrusion detection, prevention, and rogue management.

Wireless security standards:

1 - 3 of 7
  • Wireless LAN security: 802.11i

    Tip -  What is 802.11i, and is it really practical for you to implement in your organization? Robbie Harrell explores how the new wireless standard can improve security -- and reasons why you may want to switch to 802.11i or stick with WPA.

  • Router Expert: Secure WLANs - Understanding the protocols

    Tip -  This tip reviews the 802.11 architecture and the PHY standards for 802.11a, b, and g and performance expectations.

  • Upgrading your WLAN to WPA2

    (presented by SearchMobileComputing.com)

    Tip -  This month Lisa Phifer examines WPA2 and gives us insight into its new security features, fast roaming options and explains how to enable coexistence.

VIEW ALL IN THIS CATEGORY

Wireless security strategies:

1 - 3 of 12
  • Five steps to stamp out unsafe Wi-Fi use

    Tip -  Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage.

  • Network Security First-step: Wireless security

    Tip -  This tip introduces you to wireless LANs (WLANs) and the security risks associated with them.

  • Using VLANs to compartmentalize WLAN traffic

    School -  Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag and...

VIEW ALL IN THIS CATEGORY

Wireless threats and vulnerabilities:

1 - 3 of 7
  • Wi-Fi vulnerability assessment checklist

    School -  Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions.

  • Burton: WLANs safe for everyone

    14 Jul 2005

    Article -  A Burton Group analyst says it's time to cast those enterprise wireless LAN security and management fears aside, and explains why Wi-Fi is finally a viable alternative to wired networks.

  • Wi-Fi Security - Chapter 4

    Tip -  This chapter presents an assessment of wireless security with focus on the effective response to three primary issues.

VIEW ALL IN THIS CATEGORY

WLAN intrusion detection and prevention:

1 - 3 of 8
  • Beyond wireless intrusion detection

    (presented by SearchMobileComputing.com)

    Tip -  Unauthorized devices pose a threat to every WLAN. Learn wireless intrusion detection and prevention systems can help protect your valuable assets.

  • Using your WIDS to monitor WLAN performance

    School -  "Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to...

  • Recipe for rogue hunting

    School -  Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help.

VIEW ALL IN THIS CATEGORY