Section 21.199 Security Techniques: and Wireless Infrastructure Security Flashcards
Objective 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objective 4.5 Given a scenario, you must be able to modify enterprise capabilities to enhance security.
Wireless Infrastructure Security
Crucial for securing wireless networks in organisations
Wireless Access Point Placement
WAPs allow wireless devices to connect to a wired network using Wi-Fi standards
Placement influences:
● Network range
● Coverage
● Security
Proper placement prevents unauthorised access by limiting signal leakage or
dead zones
Wireless Access Point Placement
Placement Considerations
■ Avoid placing WAPs near external walls or windows to prevent signal leakage
■ Place WAPs in central locations for optimal coverage
■ Use unidirectional antennas when WAPs are near external walls
■ Mount WAPs on higher locations, such as ceilings, for better coverage
Extended Service Set (ESS)
■ Multiple WAPs work together to provide seamless network coverage
■ Important for large buildings where a single WAP is insufficient
Wireless Access Point Interference
nterference occurs when multiple WAPs use the same channels or overlapping frequencies
Types:
● Co-Channel Interference
● Adjacent Channel Interference
In the 2.4 GHz band, select Channels 1, 6, and 11 to avoid overlap
Tools for ensuring good Wireless Access Point Coverage
Site Surveys
● Essential for planning and designing wireless networks
● Involves a site visit to test for radio frequency interference and identify optimal WAP installation locations
Tools for ensuring good Wireless Access Point Coverage
Heat Maps
Graphical representations of:
○ Wireless coverage
○ Signal strength
○ Frequency utilisation
Useful for troubleshooting:
○ Coverage issues
○ Dead zones
○ Signal leakage
Aid in visualising the effectiveness of WAP placement and configuration