11.07.2015 Views

Mac OS X Security Configuration - Office of Information Technology

Mac OS X Security Configuration - Office of Information Technology

Mac OS X Security Configuration - Office of Information Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Preventing RF EavesdroppingMost network environments have wired and wireless access to the network. Wirelessaccess helps businesses or organizations <strong>of</strong>fer mobility to users throughout theirnetwork.Although wireless technology gives your network more flexibility with your users, it cancause possible security vulnerabilities you may be unaware <strong>of</strong>. When configuring awireless access point make sure you properly configure the security settings to preventunauthorized users from attempting to access your network.Your wireless access point should require encryption <strong>of</strong> the connection, userauthentication (through the use <strong>of</strong> certificates or smart cards), and time-outs forconnections.By requiring an encrypted wireless connection you can maintain the integrity <strong>of</strong> databeing transmitted to your wireless access point. The use <strong>of</strong> certificates or smart cardshelps to ensure the users identity, that your users are who they say they are.Also, setting a time-out that disconnects wireless user connections lasting longer than8 to 10 hours prevents your network from being attacked by a computer that isconnected through your wireless access point and left unattended.If you need to use WiFi, see “Network Access Control (802.1x)” on page 162 to leverage802.1x for securing WiFi traffic.Understanding RF <strong>Security</strong> ChallengesMany <strong>Mac</strong> laptop computers have a built-in wireless network card. Users can configuretheir computer to be a wireless access point to share their Internet connection withother users. However, a user creating this wireless access point doesn’t usually securelyconfigure it, creating a point <strong>of</strong> access for an attacker.Anyone within the wireless range can gain access to your network by using anauthorized user’s insecurely configured wireless LAN. These possible points <strong>of</strong> accesscan be very large, depending on the number <strong>of</strong> users with wireless technology on theircomputers.The challenge arises when trying to prevent users from creating this access point toyour network or trying identify where the access points are and who is attempting touse these insecure wireless access points.Many organizations restrict the use <strong>of</strong> wireless technology in their networkenvironment. However, many <strong>Mac</strong> laptop computers have wireless capability built-inand turning it <strong>of</strong>f will probably not meet your organization’s wireless technologyrestrictions. You might need to remove components from <strong>Mac</strong> <strong>OS</strong> X to disable themfrom being mistakenly turned on in System Preferences.42 Chapter 3 Protecting System Hardware

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!