...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...
Words: 18577 - Pages: 75
...Evil Twin Wi-Fi Attacks NT1110: Computer Structure and Logic October 23, 2013 Abstract What is the “Evil Twin”? Evil Twin is a type of Wi-Fi attack, it is a home-made wireless access point that masquerades as a legitimate hot spot with a very strong signal in efforts to gather personal or corporate information. With this, the overall goal of this report is to educate the public on how to protect themselves. Additionally in this disadvantages and advantages will be discussed along with the effects on consumers and the future. According to Dr. Phil Nobles, a wireless Internet and cybercrime expert at Cranfield University, said: this is how the evil twin works. "So-called 'evil twin' hotspots present a hidden danger for Web users. In essence, users think they've logged on to a wireless hotspot connection when in fact they've been tricked to connect to the attacker's unauthorized base station. The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client -- thereby turning itself into an 'evil twin. Cybercriminals don't have to be that clever to carry out such an attack. Because wireless networks are based on radio signals they can be easily detected by unauthorized users tuning into the same frequency." The Disadvantage of Evil Twins The Evil Twins a Menace to Wireless Security > Mobile, (by Jack M German Tech News World 06/04/09). Once the wireless...
Words: 1288 - Pages: 6
...Next reports rep or ts.informationweek.com M ay 2012 $99 2012 State of Mobile Security With 62% already allowing personal devices at work, 80%, require only passwords for IT’s juggling laptop policies and Wi-Fi policies and BYOD policies—and that means security gaps big enough to drive a semi through. Most, mobile devices that access enterprise data/networks, yet just 14% require hardware encryption, no exceptions. Let’s be clear: Mobile security is data security, and we must do better. By Michael Finneran Report ID: R4720512 Previous Next reports 2012 State of Mobile Security CONTENTS 3 4 5 6 7 9 11 11 15 20 25 26 27 27 30 32 45 Author’s Bio Executive Summary Research Synopsis Lessons Unlearned Mobile Device Policies: BYOD in Full Swing What, Me Worry? Breaking It Down Wi-Fi Policy Guidance Tablet/Smartphone Policy So What Are You Doing About It? Applications and Malware Laptops and Ultrabooks Security-Awareness Training Get Going on a Secure Mobility Initiative Don’t Sit Still Appendix Related Reports 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 TABLE OF Figures 6 Figure 1: Policy on Personal Mobile Device Use? 7 Figure 2: Personal Mobile Device Policy 8 Figure 3: Percentage of Employees Using Mobile Devices 9 Figure 4: Top Mobile Security Concerns 10 Figure 5: Importance of Mobile Security Initiatives 11 Figure 6: Percentage of Mobile Devices Experiencing Security Incidents Figure 7: Securing Wireless LANs Figure...
Words: 10170 - Pages: 41
...wner/executive of an upcoming, cutting-edge company that produces video game console systems - use the Global Edge tool as a means to research the Czech Republic, -try to assess -based on what you learn, if this country is viable for the expansion of your operations. -What is your target market? -What is their age group/income? -Do you need internet access to play your game? Yes -Is the internet easily available in the country? Internet Technology for broadband connection to the Internet is widespread in the Czech Republic. You can use all regular technical connection standards. Wi-Fi Wireless connection via Wi-Fi is commonly used. You can easily connect up with a netbook, notebook or smartphone via Wi-Fi in restaurants, cafes, hotels and in many other locations. Broadband, ADSL and fixed connection Companies, households and practically all hotels in the Czech Republic commonly have a fast fixed connection available. Mobile technology You can also connect to the Internet in the Czech Republic with the aid of mobile technologies. Most large cities are covered with a signal and the level of coverage is gradually increasing. Internet access if you do not have a computer or smartphone Several Internet cafes offer connection to the Internet, a list of which can be found here. Prices for use of the Internet are individual; you may pay by the minute or by the hour. Information centres usually have a computer with Internet connection available for use...
Words: 485 - Pages: 2
...End of the twentieth century and the beginning of twenty-first century has marked a great advancing period in technological world, especially Internet. Internet has allowed users around the world to communicate with each other very quick and fast. And with the development of Wi-Fi, these communication methods have been even more available. But Wi-Fi also brings its disadvantages with it since potential hackers can access the network faster than wired networks. In this research paper, our team has put forward a goal to observe and find information about the communications ways through the internet and how to improve the security of a wireless network. During our research our team members carefully researched and practiced all those communication methods. Our goal was to evaluate the best ways of communication. Our team members have also learned the threats that could affect Wi-Fi. Our next goal was to prevent all of those threats, to find security measures and evaluate which security measure would work the best. In order to experiment the Wi-Fi and its security we have taken a hotel in Djizak City, Afrosiyob Hotel, which has been opened in July, 2012 and does not have Wi-Fi system. We will implement a Wi-Fi network and we will suggest security measures for the network and propose our plan to the owner, Mr. Jahon Isakov. Introduction Since the invention of Internet, it has had numerous uses, from data analysis to communication, from...
Words: 2429 - Pages: 10
...the use of Wi-Fi and laptops into our business. Incorporating Wi-Fi and laptops into our business will enable employees, vendors, and upper management to work faster and be more efficient. Wi-Fi is the method for wirelessly connecting to the internet. Wi-Fi can be used in our departments along with laptop computers to take orders, track inventory, or process orders without being tied to a desk computer. The laptops can be moved around in the building and will still have access to the internet. Upper level management can also benefit by having the wireless connection anywhere in the building. The pros Party Plates will run a much more efficient, competitive, and organized business by utilizing laptops and Wi-Fi in our organization. Laptops offer employees a chance to take the office with them wherever they may go. Benefits of laptops in meetings are: effective way to take and save notes, the ability to access a file instantly, login to the corporate intranet and instant message a question to another employee. Laptops present employees mobility and organization that desktops cannot reciprocate. Wi-Fi allows employees to access the web anywhere, allowing for instant access whenever it is needed. This service isn’t only beneficial to employees but also to vendors and clients. By providing Wi-Fi access we enable...
Words: 775 - Pages: 4
...Telkom South Africa aims to provide Wi-Fi and internet services targeted to end users in Brazil. This plan seeks to generate a significant increase in company sales and profits from the delivery of infrastructure to strategic align with international partners. The highlight of this plan are the targeted rollout sites as well as the amount of users we anticipate using the Wi-Fi service. The targeted gross margin and sales revenue for the first 5 years of this plan are presented in the charts and tables later in this plan We still need to do. These figures represent the key prospects available for public Wi-Fi Service in Brazil. These targets are attainable through a proactive approach and by partnering with the 2014 Brazil Soccer World Cup organizing comity. The following business plan has been created on the basis of extensive market research which showed that there will be an massive demand for public internet services. With Brazil’s mountainous topography and dense popupated landscape it is almost impossible to cover large areas with GSM masts. Therefore it is economically viable to rollout smaller areas with local Wi-Fi access. Consumers demand high speed internet connectivity which technologies like 802.11 b and n will give them. There are multiple other benefits going with Wi-Fi rather than GSM. One such benefit is that the consumer can experience speed greater than 50mb/s without having to own a 4G LTE device. Wi-Fi is much cheaper to roleout than the latest...
Words: 9966 - Pages: 40
...Robby Miller Mr. Carroll NT1210 / Fri. Night Wi-Fi in the Corporate Environment Business is much different today than it has ever been. The strategies incorporated in the success of a business can be quite complicated and requires more than just a man or woman with a dream. Success in business is now reliant on the connectivity of their business to their local area, as well as, the global market place. Wireless connectivity (Wi-Fi) in the corporate environment is making this possible and beyond possible as it improves. In this paper we will see some pro’s and con’s of wireless connectivity in the corporate environment. Corporations are looking to go wireless for many different reasons. These range from having less wire to having office resources available in the office and in the field. Many companies realize that field productivity and efficiency is slowed down to limited resources of company information. Corporations find that customers sometimes have to wait for price quotes and in turn lose some of those to the competition, since they did not get their information fast enough or the customer was forgotten about. Unfortunately, these things happen in the corporate environment and with the new 802.11g and 802.11n technology, connectivity to company resources is reaching higher levels than ever, so much so, that Wi-Fi is becoming a must in most business environments. More people are using their phones, PDA’s, iPads, and laptops while traveling or away from their...
Words: 961 - Pages: 4
...broadband to allow more effective lines of communication with customers and employees which will increase revenue and productivity to allow continued growth. Benefits of Implementing Implementing wireless technologies into the Party Plates organization has many benefits utilizing such devices as the vast varieties of tablets and hot spot Wi-Fi systems. A few uses with the tablet are as follows the use within “sales support” is vital and can help boost accessibility to the sales representative and give an easier and very mobile use of a sales tool increasing productivity and marketing. As well as giving a new touch to product showcasing one can use a tablet to give a “customer presentation” either through a power point slide or a comprehensive in depth view of our many products and design customizations. Another wireless technology to be considered to implement into Party Plates is the use of wireless hot spot Wi-Fi, in the office many employees are confined to desktop computers. While the use of the Wi-Fi hotspot can allow office-based employees can network and collaborate while away from work, such as home to access corporate data while with customers on site. This is also falls into account for better coverage enabling the employee to communicate on the move to present to customers or a conference without sacrificing time to find or connect to immobile office networks, no need for adapters or cables to access the corporation’s data. * Sales Support * Customer presentation ...
Words: 692 - Pages: 3
...I chose an article that deals with wireless security. This is a technology that interests me greatly as it is a technology that is growing more and more everyday. In terms of security though, it may not quite be up to standard. Considering the amount of people that are using this technology, it is quite shocking at the amount of trust they have in these wireless connections. In the article that I am reviewing the author talks about wireless security or the lack there of. The first topic the author talks about is packet sniffing. Some very good points were brought up in this section that I agreed with completely. The traffic on these wireless connections is vulnerable to attackers who could intercept the traffic and turn it into useful information (i.e. passwords). There are plenty of tools available to inexperienced hackers that allow them to attack wireless transactions. These points are completely valid concerns, and something that users should consider before using wireless connections, especially those in public places. The author then transitions into talking about fake access points. This is another great strategy used by hackers that many unsuspecting wireless users fall victim to. Hackers set up their own personal devices to look like wireless access points. When a user connects they are then sharing information directly wit the hackers laptop, or pc. This is a very great point for users to consider. Many of todays users see a wireless access point and use it...
Words: 484 - Pages: 2
...Introduction AT&T Inc. is an American multinational telecommunications corporation headquartered in Whitacre Tower, downtown Dallas, Texas. AT&T Inc. (AT&T) is a provider of telecommunication services to its customers, predominantly in the US. The company offers both wireline and wireless-based telecommunication services. The company’s service offerings include local exchange services, data/broadband and Internet services, and long-distance services. Besides, it also offers video, telecommunications equipment, managed networking, wholesale services and directory advertising and publishing services. AT&T provides voice coverage in over 225 countries, data roaming in over 205 countries, and 3G in over 145 countries. AT & T, the nation's fastest, most reliable 4G LTE network for a widespread, ultra-fast and consistent experience. AT&T's mobile Internet service footprint covers more than 80 percent of the U.S. population, including the top 100 U.S. markets. This company expanding 4G LTE across their network footprint and AT&T customers will continue to have access to fast 4G speeds even when they are outside of an LTE area. They are constantly working to deliver new capabilities and applications via their access network. For example, their U-verse service deployment is enhancing our wired access capabilities to deliver advanced IPTV services to residential customers. AT&T is bringing it all together for our customers, from revolutionary smartphones to next-generation TV services...
Words: 3538 - Pages: 15
...System Recommendation for UM&UC Executive Summary UM&UC is a firm that designs, builds, and sells precision measurement tools which are used in scientific, medical, and energy industries. The sales team has become extremely mobile and are facing challenges that impact the effectiveness of the team. UM&UC hired an independent consulting firm to analyze these challenges and make recommendations to improve the sales and sales support effectiveness. The findings of the consulting firm were that the sales and sales support teams are mainly mobile. The sales and sales support teams also need the same capabilities available at a UM&UC facility, but through a mobile device. The IT infrastructure of UM&UC has not kept up with the growing needs of the sales and sales support teams, and many of the team members are trying to use personal mobile devices to help bridge the gap; team members are finding that these devices do not have the necessary access to company IT resources. UM&UC has set aside funding to act upon the recommendations set by the independent consulting firm. They will transition the sales team and other members to tablet style mobile devices. UM&UC has set aside funding and is ready to choose a standard device and implement it for the sales and sales support teams. Recommendation Scope A standard tablet style device will be chosen for each member of the sales and sales support teams. Each unit will not exceed $750. The tablet...
Words: 1327 - Pages: 6
...AT&T Headquartered in Oakton, VA, AT&T Government Solutions is a long-standing, trusted source of information technology solutions for the federal government, integrating unmatched network resources and IT managed solutions expertise with innovative technologies from AT&T Labs and a complementary team of industry-leading technology companies. Best known for network leadership in voice, data, video, and managed services, AT&T is a proven solutions integrator, with professional service expertise in enterprise architecture, business transformation, knowledge management, training, program management, systems engineering and security. More than 4,000 scientists, engineers and analysts – many with security clearances – focus exclusively on the IT requirements of government, with support from tens of thousands of professionals throughout the AT&T family of companies. Externally evaluated as a Software Engineering Institute - Capability Maturity Model Integration (SEI-CMMI) Level-3 organization and an International Organization for Standardization (ISO) 9001:2008, AT&T has the proven processes and procedures in place to deliver on time, on budget, with quality service. 1. Leadership Enterprise Management solutions from AT&T are designed to optimize the efficiency and availability of network services and mission applications. Enterprise Management process tools, implemented throughout your IT organization, can help your agency: * Increase automation...
Words: 3651 - Pages: 15
...wireless computers networks. Wireless communications also covers wireless phone networks as well as our wireless computer networks. While writing this paper I will try to keep it on just the wireless computer networks, but you will have to keep in mind that this all was started with the telephone and branched out toward computers and other handheld devices. Me like everyone else probably had never really look at wireless as a very vast network which started in 1876 when the phone was invented by Alexander Graham. In 1877, Charles Williams of Somerville Ma had the first private telephone was installed in the home. Four years later over 47,850 telephones were in use in the U.S. (Fowler, 2009). This was the start of the evolution of Wi-Fi, Guglielmo Marconi, an Italian inventor took it a step closer nine years later, and he proved the feasibility of radio communications by sending and receiving the first radio signal. Then in 1869, the first wireless signal across the English Channel was flasher by Marconi. (Fowler, 2009) This should not be confused with the Birth of Telecommunication as some people have linked Telecommunication with wireless communications as John M Shea, an associate Professor of electrical and Computer Engineering from the University of Florida did in an article were he stated in “The History of Wireless Communications” that The first telegraph? Perhaps drum communication [wikipedia] or signal torches, such as those used for communication in ancient Greece...
Words: 3062 - Pages: 13
...square feet of the hospital, and if doesn’t meet your objectives, we’ll pull it out.’” For Altoe and her team, the decision was obvious. “We felt fairly comfortable they had a good product if they were willing to go out on a limb.” For its part, Skytron wanted to show how easy it is to install its RTLS (Real-time Location Solution) asset-tracking technology, which is compliant with the IEEE 802.15.4 standard. Since the technology doesn’t tap Wi-Fi networks, deployment consists of plugging in sensors to the AC current, attaching tags to the devices being tracked, and installing monitoring software. The need for new wiring and routing devices is very limited, which translates to considerably lower deployment costs. As anticipated, Nemours kept the system after seeing it in action. It was affordable and brought much-needed change without disrupting patient care. “We were looking for something we could quickly install and easily deploy,” says Altoe. The hospital contacted Skytron after researching several vendors. Having invested in a Wi-Fi network, the Nemours team originally wanted an 802.11 solution, and had started zeroing in on a particular supplier. But after attending...
Words: 998 - Pages: 4