Wireless offers the possibility of always-on, instant mobile communications. However, the vulnerabilities inherent...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
to wireless computing present daunting hurdles. These vulnerabilities -- eavesdropping, session hijacking, data alteration and manipulation, in conjunction with an overall lack of privacy -- are major challenges posed by wireless technologies.
Fortunately steps can be taken to lessen the impact of these threats. Securing wireless networks includes adopting a suitable strategy as MAC address filtering, firewalling or a combination of protocol-based measures. A few specific steps are:
- Change the AP's default admin password
- Change the access point's default SSID
- Disable the "Broadcast SSID" function on the AP
- Enable WEP and the stronger 128-bit encryption, not the breakable 40-bit
- Employ MAC address filtering
- Implement an authentication server to provide strong authentication
- Physically locate the AP in an area that limits its radio emanations
- Logically put the AP in a DMZ with the firewall between the DMZ and the internal network
- Implement VPN tunnels
- Disable DHCP and assign static IP addresses
- Penetration test regularly
- Research migrating to 802.11i technologies and new WEP encryption workarounds
Penetration testing -- Securing wireless access points
War walking and war driving
WLAN vulnerabilities, SSID issues, WEP weakness
WLAN DoS attacks, MAC address vulnerabilities
Wireless testing tools
WLAN security countermeasures
About the author
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons.