Free Essay

Recommendations for Wireless Network Security Policy

In:

Submitted By wachirastephen
Words 906
Pages 4
RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY

Introduction
One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security.

SECURITY THREATS
There are a number of types of attack that wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium
Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default
Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities.
There were two problems with the original WEP encryption system.
Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service
This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network or unintentional attack which exploits the lack of verification of control frames in the wireless network iv. Injection of traffic
A new tool has been released which allows a malicious user to inject or insert traffic at the application layer. The potential for misuse of this tool is great: the example used had pornographic images being displayed on the screen of wireless users. v. Rogue Access Points
These are access points that are set up using the MAC address and SSID of a valid AP. An attacker would firstly use a DoS attack against the wireless client to force it to dissociate from the valid AP.

THE SOLUTIONS
The security options available to protect the wireless network form the various types of measures listed above will be classified into two groups: data security, and user authentication 1. Data security.
Data security addresses the problems with wireless networks that relate to encryption and protection of data on the network. These include WEP with centralized encryption key servers, temporal key integrity protocol,
Advanced encryption standard and virtual private networks. a. WEP key servers.
These are centralized key encryption server makes it possible to have the key changed regularly, thereby reducing or eliminating some of the risks of using the WEP system. Keys can be changed on a per packet, or per session basis. b. Virtual private networks (VPN)
VPNs have long been used in a wired environment, usually to protect remote users dialling into a corporateserver. The added security of having all traffic pass through an encrypted tunnel makes provide access to the corporate network, a viable option c. Temporal key integrity protocol (TKIP)
The use of this meant that the installation of additional servers to manage the task of key rotation became unnecessary. It also means that it is an extremely difficult task for an attacker to crack or derive the key. d. AES/CCMP
This increases the security of wireless networks by incorporating additional features of the IEEE 802.11i security protocol. The AES/CCMP encryption system is generally acknowledged to be virtually unbreakable. 2. User authentication.
These are means of verifying and establishing the identity of both client and access point, for the purposes of creating and/or maintaining a valid connection. a. MAC address filtering and SSID masking
MAC address filtering involves entering a list of MAC addresses, which are unique to every network device, into the AP, or to a server this means that only users with a MAC address on this list can connect to the network. b. Radius
This is a system of authentication which has been used for many years with wired systems.
It is a service which can run on an existing server, or a dedicated server depending on user load. c. 802.1x and EAP
The IEEE802.1x authentication system is a means for authenticating and controlling user access to a protected network, as well as dynamically varying encryption keys. 802.1X works in conjunction with an extensible authentication protocol (EAP) to both the wired and wireless LAN media.

RECOMMENDATIONS FOR A WIRELESS SECURITY POLICY
Home
The greatest danger to a home user is that of theft: leaving an AP open can allow someone to steal their internet bandwidth.
Small Business
In addition to bandwidth theft, small users such as real estate agents, medical professionals and small retailers are exposing themselves to a potentially greater risk. If the signal from an AP that this type of business has setup is accessible from a distance, then their data is not secure.
Enterprise
Large organizations are less likely to have bandwidth stolen because they usually have the infrastructure in place to ensure that users are authenticated before being allowed access to the internet. Authenticating to a RADIUS or proxy server to gain access to network resources would normally be in place as part of their wired network, and this can be extended to cover the WLAN. What larger organizations are at greater risk of is people stealing their data.

Similar Documents

Premium Essay

Network Penetration Testing

...Establish Evacuation routines    3. Acquisition of Intelligence.   a.    Obtain Hard & Soft Copy Information b.    Obtain Top Managerial Personal Information, (Addresses etc) c. (Optional deployment of Ethical Hacking)   4. Disruption/Sabotage   a.    Insertion of dummy explosive/incendiary devices (Packages, Letter Bombs etc). b.    Abduction plan 5. Report The time frame is variable dependent on current security protocols and staff awareness. Client Network Penetration Testing Proposal Document Reference xxx-xxxx-xx Contents 1 Background 3 2 Scope 4 2.1 Types of Attack 4 2.2 Report 5 2.2.1 Executive Summary 5 2.2.2 Technical Report 5 2.2.3 Recommendations 5 2.2.4 Security Policy 5 3 Phase 1 – Internal 6 3.1 Scope 6 3.2 Deliverable 6 4 Phase 2 – Internet 7 4.1 Scope 7 4.2 Deliverable 7 5 Phase 3 – WarDial 8 5.1 Scope 8 5.2 Deliverable 8 6 Phase 4 – Wireless 9 6.1 Scope 9 6.2 Deliverable 9 7 Phase 5 – 3rd Party Access 10 7.1 Scope 10 7.2 Deliverable 10 8 Phase 6 – Remote Access 11 8.1 Scope 11 8.2 Deliverable 11 9 Phase 7 – Social Engineering 12 9.1 Deliverable 12 10 Products Used 13 10.1 Hardware 13 10.2 Software 13 11 Quotation...

Words: 2185 - Pages: 9

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Free Essay

Tft2

...4, 2014 ABC Company Proposed revision of Information Security Policy Anthony Ronning: Information Security Manager OBJECTIVE: Due to the recent breach of our electronic health record (EHR) systems, it is necessary that policies pertaining to access and control mechanisms of health records be reviewed and/or modified to mitigate future incidents SPECIFIC GOALS: 1.) Implement a standard based on Attribute Based Access Control (ABAC) to ensure that electronic health records (EHR) are protected from unauthorized entities 2.) Implement a standard for the use of remote access methods to information systems 3.) Implement a standard that ensures that access to electronic health records (EHR) is audited and backed up without changes or over writing INFORMATION SECURITY POLICY GOALS: * Confidentiality = data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity plan of...

Words: 2279 - Pages: 10

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Premium Essay

It Asset Inventory List

...servers for the teachers for student information, Firewall(s), Router(s), and Switch(es), Wireless Access, Principal Laptop, and Student Records. 2. List your top five (5) risk exposures for which you believe this school should have specific risk mitigation strategies. My top five (5) risk exposures would be wireless access security, the principal’s laptop being left or stolen when she travels and the password being easy to guess, social engineering to gain access to not only student systems (laptops and computer science computers) but also to teacher and administrator systems, the use of Facebook, MySpace and Twitter while at school exposing daily activities and routines while at school or work in the case of the faculty, Physical security at the school protecting the servers, student data, school business information, etc. and strong password policy. 3. Given the potential risks that you identified, what IT security policies would you recommend be created by the school to help mitigate each of the identified risk exposures you listed in #2 above? First and foremost a comprehensive security policy that takes into consideration the variables and factors at the school. This includes students, teachers, physical access, layout of the school and property, security measures as defined by FERPA, HIPAA, etc. A password policy needs to be in place that stresses complexity, minimum length (recommendations) and recycling or expiring passwords. This could be accomplished with a minimum length...

Words: 1205 - Pages: 5

Premium Essay

Risk Assessment

...made use of technological innovation and automation of their systems. However, as GFI experienced a steady growth in its financial operation, a significant security risk lack within its network. GFI relies on its application servers; the Oracle database and the email system that are the backbone of the GFI financial operations. The financial and cash flow system of the company solely depends on the network, any network breakdown, and system failure would be catastrophic for the business and its clients. The recent multiple cyber attacks on the GFIs network and the 2012 Oracle server attack that left the company integrity, confidentiality and availability venerable for several days. Although the servers were restored, the damage was extensive and lead GFI to pay for clients damages in their loss of data confidentiality. Another attack left the entire GIF network down that lead to losses in revenues and intangible customer confidence to the tunes of over a million US dollars. Risk Assessment Purpose The aim of this risk assessment is to evaluate the details of GFI network security. Further, the risk assessment is to come up with a structured qualitative assessment of GFIs network environment and provide possible solutions for mitigating the sensitivity, threats, vulnerabilities, risks and safeguards of the GFIs network. Besides, the assessment will recommend on a potential cost-effective assurance that will combat the threats and associated exploitable...

Words: 2661 - Pages: 11

Premium Essay

Risk Assessment in Information Technology

...discuss factors used to identify all kinds of risks in company network diagram. It will also assess the risk factors that are inclusive for the Company and give the assumptions related to the security data as well as regulatory issues surrounding risk assessment. In addressing the global implications, the paper will propose network security vulnerabilities and recommend the mitigation measures for the vulnerabilities. Cryptography recommendations based on data driven decision-making will be assessed, and develop risk assessment methodologies. Risk assessment in Information Technology Risk assessment is one of the mitigation methods for the Networks design. The scanners or vulnerability tools are used to identify the risks or vulnerabilities within the network design. The risks can be identified by these tools as they extend beyond software detects to incorporate other easily vulnerabilities including mis-configurations (Rouse, 2010). The shareware assessment tools are accessible online and can be used to supplement commercial scanners. Framework of risk assessment * Step 1 – categorizing information and information systems. Here unique department traits are highlighted and assigned impact levels (high, medium or low) in line with the security FISMA’s security objectives (confidentiality, integrity and availability). * Step 2 – security control families; common, hybrid, and system-specific security controls; tailoring and the identification of control enhancements...

Words: 3240 - Pages: 13

Premium Essay

Apex Design Plan

...1/19/2015 1/19/2015 One Giant Leap for Apex Design Wireless Network Plan One Giant Leap for Apex Design Wireless Network Plan Team B Team B Apex Design has found the need to incorporate a wireless network to collaborate with their existing wired network. Team B found this opportunity to display to Apex what they can do to bring their company to enjoy the modern conveniences of a wireless network. This deployment plan will cover Team B’s recommendations based off of the site survey provided by Apex. We will discuss our recommended wireless network type. The access point layout and how these points will be managed. We will go over the foreseen obstacles and what our plan is to overcome these obstacles. Finally, we will go over the security policy that should be implemented to keep Apex as secure with our wireless network as they are with their current wired network. IEEE Network Type Apex Designs has asked our company to design a wireless network for their business. This network will consist of several different pieces of hardware that all will work together to meet Apex’s needs. To ensure that the new network is operational, special considerations must be made as to which IEEE network standard to be used. Since Apex Designs is a business that has a preexisting network installed, the new network must be compatible with the legacy systems already in use. Failure to meet this requirement would cause major interruptions in work flow, thus hindering...

Words: 1940 - Pages: 8

Premium Essay

Nt1310 Unit 3 Assignment

...Recommended Network and suggestions Student’s name University name Instructor’s name 8th August 2014 What is the first step you will take in developing a strategy to respond to this situation? The reviewed of the client requirements and their existing architecture it sounds like there is no wireless architecture in place also security policies. As described on the requirements Richton’s intent to resolve a large scope of network performance and security issues by doing a simple quick fix to enhance their network. The first step I will take in developing a strategy to respond to this situation. During the meeting I would like to discuss with Richton Toy management team the security risk installing 802.11b wireless...

Words: 1357 - Pages: 6

Premium Essay

It244 Final

...Manufacturing is an up-and-coming company that is now expanding to China, as well as other locations throughout the United States. The company will have the need for new equipment, a set-up appropriate for all locations to be able to communicate together on a weekly basis, and security is a priority. With the headquarters being located in Atlanta, GA, they house the corporate operations, marketing, administrative staff, and accounting personnel. The engineering and sales departments are located across the street from the headquarters building. There are distribution offices in Chicago, Phoenix, and New York and the plant is in China. All of these places need the ability to communicate with each other so the company can run smoothly. Currently, each location sends people once a week to a weekly meeting the company has to stay on top of everything. Network Design The best network design for Acme Manufacturing would be a star topology, which would use CAT5 UTP. Using this cable would allow each location to have the ability to directly connect to headquarters and, with the implementation of a Virtual Private Network (VPN) that is configured with Layer Two Technology Protocol (L2TP) and IPSec for security, the sales and engineering departments located across the street will be able to communicate with headquarters. The new plant in China will utilize satellite signals to communicate with headquarters. Acme should lease three T1 lines, which run from the headquarters in Atlanta to...

Words: 1704 - Pages: 7

Premium Essay

Test Paper

...Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details ................................................................................................................................. 10 Topology ................................................................................................................................... 10 Wireless Fidelity ....................................................................................................................... 11...

Words: 12729 - Pages: 51

Premium Essay

Crm and Impact

...threat to organization image, the establishment of an effective security measures and reassessment of organizational risk management approaches in order to cater with latest implication trend in network security. This report is based on literature review, analytical analysis of case studies, news articles magazines to highlight vulnerability and implication of malware attack to an organization, highlights the salient features of malware attack, malware attacks that can significantly hurt an enterprise information system, leading to serious functional commotions, can result into destructing the basic IT security up to identity theft, leakage of data, stealing private information, corporate information system blue prints, industrial white papers and networks break down. The only constant in the world of technology is a change, report highlights the latest trends, dimension and implication of malware attack and new critical source of threats, within the perspective of constantly changing IT world (e.g. cloud services-integration) Enterprise may not effectively device and manage malware threat and 'risk assessment processes. This report highlight the malware propagation process, malware vulnerability, the types of malware, optimistic cost effective solution in order to minimize security risk for an Enterprise information systems. This Report highlights salient features for designing an effective security policies in order to proactively addressing malware threats issues as key...

Words: 3648 - Pages: 15

Premium Essay

Security Project

...SECURITY WEAKNESSES FOR QUALITY WEB DESIGN Contents Course........................................................................................................ Error! Bookmark not defined. Introduction ............................................................................................................................................ 3 Abstract .................................................................................................................................................. 4 Company Background.............................................................................................................................. 4 Software Weaknesses and Recommendations......................................................................................... 5 Hardware Weaknesses and Recommendations........................................................................................ 6 Network Security flaws and Recommendations ....................................................................................... 7 REFERENCES:........................................................................................................................................... 7 Introduction A company that deals with making web site and web business solutions is known as Quality web design. The company provides its customers to provide an opportunity so that they can spread their business through the internet. The other business solutions accompanied are accounting...

Words: 1406 - Pages: 6

Premium Essay

Week 5 Inf 325

...Between ‘Implementation’ and ‘Policy’ and Describes the Importance of Their Separation Management defines information security policies to describe how the organization wants to protect its information assets. After policies are outlined, standards are defined to set the mandatory rules that will be used to implement the policies. Some policies can have multiple guidelines, which are recommendations as to how the policies can be implemented. Finally, information security management, administrators, and engineers create procedures from the standards and guidelines that follow the policies. This is a major flaw in the linear model because policies often change as they move through bureaucracies to the local level where they are implemented. ‘Implementation always makes or changes policy to some degree’, (Lindblom 1980). ‘Policy implementers interact with policy-makers by adapting new policies, co-opting the embodied project designs or simply ignoring new policies, hence underscoring the fact that implementers are crucial actors whose actions determine the success or failure of policy initiatives’, (Juma and Clarke 1985). Better practice implementation plans are scalable and flexible. They reflect the degree of urgency, innovation, complexity and/or sensitivity associated with the particular policy measure, and provides sufficient detail to support and inform successful implementation. One of the most important effects of the division between policy-making and implementation is...

Words: 1375 - Pages: 6

Premium Essay

Network Evaluation

...In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following 15 evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the company should be made available as needed in order for the evaluation to be as accurate as possible. It will be necessary to perform a review of all client computers that connect to the company assets. These machines will be analyzed for speed, performance, and reliability. I will look for variations in hardware manufacturers. Depending on the circumstance, it can result in better TCO (Total Cost of Ownership) if client computers are limited to one or two manufacturers. In addition, machines that are broken, out of warranty, or outdated will be recommended for repair or replacement. 1. 2. Evaluation of Client Computer Software In the evaluation of client computer software, I will seek to identify all software that is installed on client computers and being used in the workplace. This evaluation can be performed using software metering in software such as Microsoft System Center Configuration Manager, if installed. If not installed, this information will be collected manually by viewing the installed software on each machine. ...

Words: 2399 - Pages: 10