Securing a SOHO Network Flashcards
1
Q
SSID management - Securing a SOHO Network
A
- Service Set Identifier - Name of the wireless network
- Change the SSID to something not-so obvious
- Disable SSID broadcasting?
- SSID is easily determined through wireless network analysis
- Security through obscurity
2
Q
Wireless encryption - Securing a SOHO Network
A
- All wireless computers are radio transmitters and receivers
- Solution: Encrypt the data - Everyone gets the password
- Only people with the password can transmit and listen
3
Q
Antenna placement - Securing a SOHO Network
A
- Central coverage to reach all areas of the building
* Don’t overlap frequencies
4
Q
Power level controls - Securing a SOHO Network
A
- Usually a wireless configuration - Set it as low as you can
- Consider the receiver - High-gain antennas can hear a lot
5
Q
MAC address filtering - Securing a SOHO Network
A
- Media Access Control - The “hardware” address
- Keeps the neighbors out - Additional administration with visitors
- Easy to find working MAC addresses through network analysis
- MAC addresses can be spoofed
- Security through obscurity
6
Q
Using WPS (Wi-Fi Protected Setup) - Securing a SOHO Network
A
- Allows “easy” setup of a mobile device
- Different ways to connect
- PIN configured on access point must be entered on the device
- Push a button on the access point
- Near-field communication - Bring the mobile device close
- USB method - no longer used
7
Q
The WPS hack - Securing a SOHO Network
A
- December 2011 - WPS has a design flaw
- PIN is seven digits and a checksum
- Seven digits, 10,000,000 possible combinations
- The WPS process validates each half of the PIN
- First half, 4 digits. Second half, 3 digits.
- First half, 10,000 possibilities. Second half, 1,000 possibilities
- It takes about four hours to go through all of them
8
Q
Defualt usernames and passwords - Securing a SOHO Network
A
- All access points have default usernames and passwords
- The right credentials provide full control/admin access
- Very easy to find the defaults for your WAP or router
9
Q
IP addressing - Securing a SOHO Network
A
- DHCP (automatic) IP addressing vs. manual IP addressing
- IP addresses are easy to see in an unencrypted network
- If the encryption is broken, the IP addresses will be obvious
- Security through obscurity
10
Q
SOHO firewalls - Securing a SOHO Network
A
- Small office / home office appliances
- Wireless access point, router, firewall, content filter
- May not provide advanced capabilities, i.e., dynamic routing, etc.
- Install the latest software - Update and upgrade the firmware
11
Q
Firewall settings - Securing a SOHO Network
A
- Inbound traffic - Extensive filtering and firewall rules
- Allow only required traffic
- Configure port forwarding to map TCP/UDP ports to a device
- Outbound traffic
- Blacklist - Allow all, stop only unwanted traffic
- Whitelist - Block all, only allow certain traffic types
12
Q
Disabling ports - Securing a SOHO Network
A
- Enabled physical ports - conference rooms, break rooms
- Always administratively disable unused ports
- Use Network Access Control (NAC) - 802.1X controls
13
Q
Content filtering - Securing a SOHO Network
A
- Control traffic based on data within the content
- Corporate control of outbound and inbound sensitive data
- Control inappropriate content - not safe for work, etc.
- Protection against evil - Anti-virus, anti-malware
14
Q
Physical security - Securing a SOHO Network
A
- Physical access = Relatively easy hack
- Door access - Lock and key, electronic keyless
- Biometric - Eyeballs and fingers
- Always have a documented and well established process