A Checklist for Developing Defenses

Step

Description

Implement basic wireless security.

Use techniques discussed in the "Basic Wireless Security" section at a minimum when deploying or maintaining wireless infrastructure:

  • MAC filtering

  • SSID broadcast disabled

  • WEP

  • WPA

Consider implementing advanced wireless security.

Use advanced wireless security techniques to further enhance your wireless infrastructure:

  • User authentication

  • 802.11i and EAP

  • Miscellaneous wireless security techniques and services to further develop the wireless security posture in use at your organization

Consider Bluetooth wireless security.

Ensure Bluetooth and other mobile devices are controlled. Know the security limitations associated with Bluetooth. Educate your Bluetooth users regarding configuration policy.

Consider implementing a wireless jail.

Consider the use of the wireless jail implementation model discussed in this document. The wireless jail provides a vendor- agnostic approach that may be coupled with other security measures to provide a layered security model. This also doesn't lock you into a particular vendor's proprietary security system.

Recommended Reading

  • RFC 2284

  • http://www.ieee.org

  • http://www.giac.org/practical/GSEC/Edgar_Cardenas_GSEC.pdf

  • http://www.bastard.net/$kos/wifi/

  • http://www.airmagnet.com/index.htm

  • http://www.blackalchemy.to/project/fakeap/

  • http://airsnort.shmoo.com

  • http:// sourceforge .net/projects/ wepcrack

  • http://www.drizzle.com/%7Eaboba/IEEE/rc4_ksaproc.pdf

  • http://www.newburynetworks.com

  • http://www.ca.com

  • http://www.airewave.com

  • http://www.cisco.com/en/US/products/sw/secursw/ps2086

  • http://www.funk.com/radius/wlan/wlan_radius.asp

  • http://airsnarf.shmoo.com

  • http://www.bluetooth.com/about/ members .asp

  • http://www.atstake.com/research/ reports /acrobat/atstake_war_nibbling.pdf

  • http://braces.shmoo.com

  • http://bluesniff.shmoo.com

  • http://www.sygate.com/index.htm

  • WI-FOO: The Secrets of Wireless Hacking by Andrew A. Vladimirov, Konstantin V. Gavrilenko, and Andrei A. Mikhailovsky (Addison-Wesley, 2004)



Extreme Exploits. Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks (Hacking Exposed)
ISBN: 0072259558
EAN: 2147483647
Year: 2005
Pages: 120

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net