| ||
Step | Description |
---|---|
Implement basic wireless security. | Use techniques discussed in the "Basic Wireless Security" section at a minimum when deploying or maintaining wireless infrastructure:
|
Consider implementing advanced wireless security. | Use advanced wireless security techniques to further enhance your wireless infrastructure:
|
Consider Bluetooth wireless security. | Ensure Bluetooth and other mobile devices are controlled. Know the security limitations associated with Bluetooth. Educate your Bluetooth users regarding configuration policy. |
Consider implementing a wireless jail. | Consider the use of the wireless jail implementation model discussed in this document. The wireless jail provides a vendor- agnostic approach that may be coupled with other security measures to provide a layered security model. This also doesn't lock you into a particular vendor's proprietary security system. |
RFC 2284
http://www.ieee.org
http://www.giac.org/practical/GSEC/Edgar_Cardenas_GSEC.pdf
http://www.bastard.net/$kos/wifi/
http://www.airmagnet.com/index.htm
http://www.blackalchemy.to/project/fakeap/
http://airsnort.shmoo.com
http:// sourceforge .net/projects/ wepcrack
http://www.drizzle.com/%7Eaboba/IEEE/rc4_ksaproc.pdf
http://www.newburynetworks.com
http://www.ca.com
http://www.airewave.com
http://www.cisco.com/en/US/products/sw/secursw/ps2086
http://www.funk.com/radius/wlan/wlan_radius.asp
http://airsnarf.shmoo.com
http://www.bluetooth.com/about/ members .asp
http://www.atstake.com/research/ reports /acrobat/atstake_war_nibbling.pdf
http://braces.shmoo.com
http://bluesniff.shmoo.com
http://www.sygate.com/index.htm
WI-FOO: The Secrets of Wireless Hacking by Andrew A. Vladimirov, Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky (Addison-Wesley, 2004)
| ||