Summary

 < Day Day Up > 

In this chapter, you learned about the dangers of wireless networks. Although wireless networks provide ease of convenience and cost, this comes at the risk of security breaches.

Wireless networks are too easily detected and WEP keys are too easily cracked. Take great caution when implementing wireless networks in your environment.

These security concerns do not mean that you should avoid wireless networks. With the proper steps, you can make your wireless network secure.

The best method is to use a variety of security measures, such as wireless IDS tools, firewalls, IPSec encryption, and 802.1x port security. When used together, these measures can provide a safe wireless infrastructure in your environment.

Note

For further information about defending against wireless network attacks, consult the following online resources:

  • "Wireless Intrusion Detection Systems" (http://www.securityfocus.com/infocus/1742).

  • GlobalNet Training's "Hands-On Wireless Defense 2-Day Course." For more information about class availability and locations, see http://www.globalnettraining.com/wireless-defense.asp.

  • "Wi-Fi Protected Access" web cast provided by the Wi-Fi Alliance, which you can download from http://www.wi-fi.org/OpenSection/protected_access_archive.asp.


     < Day Day Up > 


    Penetration Testing and Network Defense
    Penetration Testing and Network Defense
    ISBN: 1587052083
    EAN: 2147483647
    Year: 2005
    Pages: 209

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net