16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Intrusion Process 339<br />

attention to rigid security protocols when they assume the person they are speaking with<br />

knows very little to begin with.<br />

IT contractors can be especially good targets for social engineers. They are brought onto<br />

a job with very little training in security and may not realize the value of information they<br />

are helpfully providing the authoritative caller on the other end of the phone. How could<br />

they know the authoritative voice on the other end of the phone is a hacker anyway?<br />

Remember, most contractors are knowledgeable of the inner workings and details of just<br />

about all network resources on a site because they are often on that site to design and/or<br />

repair the very network they built. In wanting to be helpful to their customer, contractors<br />

often give out too much information to people who are not authorized to have such<br />

information.<br />

<strong>Wireless</strong> technology is still very new to many organizations. Employees who have not<br />

been properly educated about wireless security may not realize the dangers a wireless<br />

network can pose to the organization. Nontechnical employees who use a wireless<br />

network should be trained to know that their computers can be attacked at work, at<br />

home, or on any public wireless network. Social engineers take advantage of all of these<br />

weaknesses, and they even fabricate elaborate stories to fool almost anyone who is not<br />

specifically trained to recognize these types of attacks.<br />

15.3 Searching Publicly Available Resources<br />

Today, it is possible to find out information on almost any conceivable topic simply by<br />

searching the Internet. This new information tool can be used to find out about almost<br />

anything, including personal information about individuals, proprietary information<br />

about corporations, and even network security information that is not intended to be<br />

made public. If public information exists, it can most likely be found on the Internet with<br />

little effort. Nefarious individuals can find out who you are, the names of your family<br />

members, where you live and work, if your residence or workplace has a WLAN, and<br />

what wireless security solutions are used by your employer. As an example, many people<br />

now post their resumes on the Internet. From an individual’s resume, you may be able<br />

to determine if someone has WLAN proficiency. It is logical to therefore assume that<br />

this individual may have a WLAN set up at his or her home. This individual is also more<br />

likely than not to be connected to his or her employer’s corporate network. It is also<br />

likely that sensitive corporate data is exposed on the user’s laptop or desktop computer.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!