Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by the Internet users at home. We begin by outlining some of the basic technologies of wireless network systems
WIRELESS LOCAL AREA NETWORK
A Wireless Local Area Network (WLAN) is a type of local area network that uses high frequency radio waves rather than wires to communicate between network-enabled devices.
ACCESS POINT
A wireless access point (AP) is a hardware device that allows wireless communication devices, such as PDAs and mobile computers, to connect to a wireless network. Usually, an AP connects to a wired network, and provides a bridge for data communication between wireless and wired devices.
You can performance an assessment using a network vulnerability scanner application, which typically runs on a Windows desktop and checks such things as network ports, operating systems, and applications for a wide variety of known vulnerabilities. Using a vulnerability scanner application to perform these five steps will help secure your wireless network.
5 Steps for Assessing Your Wireless Network Security
1. Discover wireless devices on your network. You need to know everything about each wireless device that accesses your network, including wireless routers and wireless access points (WAPs) as well as laptops and other mobile devices. The scanner will look for active traffic in both the 2.4GHz and 5GHz bands of your 802.11n wireless network. Then, document all the data you collect from the scanner about the wireless devices on your network, including each device’s location and owner.
2. Hunt down rogue devices. Rogue devices are wireless devices, such as an access point, that should not be on your network. They should be considered dangerous to your network security and dealt with right away. Take your list of devices from the previous step and compare it to your known inventory of devices. Any equipment you don’t recognize should be blocked from network access immediately. Use the vulnerability scanner to also check for activity on any wireless bands or channels you don’t usually use.
3. Test your authorized access points. Make sure the WAPs on your network are just as secure as your routers and any other device that can be accessed from the Internet. Because anyone can gain access to your network through a WAP, it must have the latest security patches and firmware installed. Make sure you’ve changed the default password from the factory-set ”admin“ to a strong, hard-to-crack password. Also, check that the WAP is configured to use the most secure options such as the strongest available authentication setting and an encrypted admin interface, is using filters to block unauthorized protocols, and is sending security alerts.
4. Update your device inventory. Now is a good time to find out if users have brought in any new wireless devices and check for any other new 802.11g or n devices that are accessing your WLAN. Update your inventory to include every smartphone, tablet, laptop, desktop, voice-over-IP (VoIP) phone, and any other wireless device that is approved to access your network. For each of these devices, find out if it is running the most current operating system and associated security patches, is running current antivirus and antispam software, and is configured according to your company’s security policy.
5. Take action and eliminate vulnerabilities. The last step is to plug the holes your vulnerability scanner reveals. For instance, install missing or new security patches to your WAPs and to users’ devices, change passwords so they’re more secure, and re-educate users about your security policy and acceptable use policy.
This video is about E-SPIN Wireless Network Security Assessment Services Overview that will give you more information regarding this product.
For those who can not join us for the end user and channel partner product seminar session, please see the summary and highlight clip for the event.
For further information, please contact us or visit to our website on https://www.e-spincorp.com