CEH.V6.-.Module.20.Hacking.Wireless.Networks

Reproduction is strictly prohibited wireless network

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: ing on network access points Do not give the network a name that identifies your company, like EC-Council-NYC Move wireless access points away from windows Disable DHCP and use manual IP addresses Do not allow remote management of access points EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Securing Wireless Networks (cont’d) Use the built-in encryption at the access point Disable the features you do not use such as printing and music support in the AP Upgrade your firmware regularl larly Put a firewall between the wireless network and other company computers on the network Encrypt data at the application protocol, for example, SSL Change all default settings for access points: • Such as the IP address Regularly test wireless network security Include VPN in your wireless security solutions EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wireless Network Security Checklist Checklist Ensure that all unused ports are closed Any open ports must be justified “Pessimistic” network view Enforce the rule of least access Ensure SSIDs are changed regularly Ensure insurance and authentication standards are created created and enforced Use strong encryption SHA-1 (Secure Hashing Algorithm) Initiate encryption at user and end at server that is behind the firewall, outside the DMZ Treat WLANs as untrusted networks that must operate inside the DMZ EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wireless Network Security Checklist Checklist (cont’d) Access trusted network via VPN and two-factor authentication Increase application security: Possibly through use of an enterprise application system Minimally through increased encryption Do not allow ad hoc WLANS Embrace and employ the 802.11i IEEE security standard Native per user access control Nat Native strong authentication (tokens, smartcards, and certificates) (to Native strong encryption EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WLAN Security: Passphrase A passphrase is a sequence of words or other text used to control access to a computer system, program, or program or data It is similar to a password in usage, but is generally longer for added security Passphrases are often used to control both access to, and operation of, cryptographic programs and systems Passphrases are particularly applicable to systems that use use the passphrase as an encryption key EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Don’ts in Wireless Security • Do not breach your own firewall • Do not reject Media Access Control • Do not reject WEP • Do not permit unauthorized access point • Do not permit Ad-hoc Laptop communication communication EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Wireless Wireless Security Tools EC-Council Copyright © by EC-C...
View Full Document

Ask a homework question - tutors are online