What You ve Learned


What You've Learned

  • Mobile users present unique challenges to network administrators because they roam to unprotected networks where standard security precautions may not be in place.

  • Wireless networks also present a challenge because the wireless radio frequency signal can migrate beyond walls, into parking lots for example, and because wireless networks use shared bandwidth that is visible to attackers. Attackers can intercept and analyze traffic on wireless networks, and possibly even change data on wireless networks and devices.

  • To protect Bluetooth users, Macintoshes should not be discoverable, Internet access via Bluetooth should be avoided, and Bluetooth file transfer and exchange capabilities should be disabled until they are needed. Pairing should be required to start any sort of file transfer or exchange.

  • To protect WLAN networks and users, the best option is WPA Enterprise. WPA Enterprise requires the configuration of a RADIUS server, which may not be appropriate for home and small business networks that support five or fewer users.

  • WPA Personal does not require a RADIUS server but is still more secure than WEP because it uses TKIP. With TKIP, the encryption key is changed with every packet, thus thwarting key-derivation attempts.

  • Mobility is one of the most sought-after features of laptop users. These users expect to be "plugged in" at all times, communicating with coworkers, friends, and family members wherever they are. However, mobile users, and the IT professionals who support them, should be especially vigilant when using Bluetooth and WLAN technologies to ensure a successful computing experience, unhampered by security problems.

References

Books

Gast, M. 802.11 Wireless Networks: The Definitive Guide, 2nd ed. (O'Reilly & Associates, 2005).

Negrino, Tom and Smith, D. Mac OS X Unwired (O'Reilly & Associates, 2003).

URLs

Apple Computer, "Choosing a password for networks that use Wired Equivalent Privacy (WEP)": http://docs.info.apple.com/article.html?artnum=108058

Apple Computer, "Designing AirPort Networks": http://manuals.info.apple.com/en/DesigningAirPortNetworks.pdf

Apple Computer, "Managing AirPort Extreme Networks": http://manuals.info.apple.com/en/Managing_AirPort_Extreme_Networks_v3.4.pdf

Bluetooth Special Interest Group, "Wireless Security": www.bluetooth.com/help/security.asp

Institute of Electrical and Electronics Engineers (IEEE), "802.1X: Port-Based Network Access Control": http://standards.ieee.org/getieee802

Lee, Wei-Meng, "Securing AirPort Extreme Networks with WPA": www.oreillynet.com/pub/a/wireless/2003/12/18/wap.html?page=last&x-maxdepth=0LessonReview




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net