16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

652 Appendix A<br />

APs is still in the proprietary domain, it is highly recommended that all APs be purchased<br />

from the same vendor. This will ensure that an end station equipped with any 802.11-<br />

compatible NIC will be able to roam between APs. In addition, any new vendor-specific<br />

security improvements that are introduced may require homogenous APs.<br />

Concerns over the usage of WEP and its ability to provide adequate security for a network<br />

have required additional measures to improve your security. It is useful to think of securing<br />

the wireless LAN as you would protect the internal LAN from the public Internet. Using<br />

this framework, you could install two firewalls: one at the gateway into your corporate<br />

LAN and another between the LAN and the wireless network. The wireless firewall<br />

can be configured to pass only VPN traffic. This allows a remote user to connect to the<br />

corporate LAN using the VPN. Likewise, a wireless user can authenticate to the wireless<br />

infrastructure while still having wireless data encrypted through the VPN tunnel.<br />

By segregating the wireless infrastructure from your wired network, and enabling VPN<br />

traffic to pass between them, you create a buffer zone that increases network security. In<br />

addition, IPSec, the main IP Layerencryption protocol used in VPN technology, prevents<br />

productive traffic sniffing, which will thwart attacks that rely on using WEP for encryption,<br />

such as AirSnort. Another advantage of using the VPN approach is if you’ve already<br />

deployed a VPN, your remote users are already familiar with the limitations imposed by it.<br />

Getting wireless users to be comfortable with similar limitations should be relatively easy.<br />

A.2 ABC Inc. InfoSec Risk Assessment Policy<br />

Policy No. 1<br />

Effective date Month/Day/Year<br />

Implement by Month/Day/Year<br />

1.0 Purpose<br />

To empower InfoSec to perform periodic information security risk assessments (RAs) for<br />

the purpose of determining areas of vulnerability, and to initiate appropriate remediation.<br />

2.0 Scope<br />

Risk assessments can be conducted on any entity within ABC Inc. or any outside entity<br />

that has signed a Third Party Agreement Insert Link and the Acceptable Use Policy<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!