3.1: Securing Wi-Fi Technologies Flashcards
Wireless network technologies
Wireless network technologies have enabled workers to connect to enterprise networks, regardless of their location in a work location.
Wireless Network Threats and Vulnerabilities
• Eavesdropping • War driving • War chalking • weak encryption • Spoofing • Session Hijacking
Eavesdropping
It’s best known with wireless LANs.
Intruders with fairly simple tools are able to easily listen in on wireless communications, even when encrypted and protected through other means. Because wireless networks use radio frequency (RF) technology, the threat of eavesdropping will never completely disappear.
War driving
looking for an unprotected Wi-Fi access point from a moving automobile.
War chalking
War chalking is the practice of marking buildings (using chalk) with symbols to indicate the presence of a Wi-Fi access point,
WEP vs WAP encryption
WAP is preferred to WEP. The most secure encryption is WAP2
Session Hijacking
an intruder on the same Wi-Fi network can intercept a user’s session cookie and then take over the session. This is common on public Wi-Fi hotspot
Wireless network countermeasures
- Use an obscure SSID -changed SSID from the default, SSID should not identify the organization
- Stop broadcast SSID - SSID should be disabled.
- Reduce transmit power - to prevent distant eavesdropper from easily detecting the network.
- Use WAP encryption - do not use WEP. Use WPA2
- Require VPN.
- Change default passwords
- Patches and updgrades
- Use a personal Wi-Fi hotspot and avoid public Wifi
- Use VPN software - to encapsulate and encrypt network traffic or public Wi-Fi