원문정보
초록
영어
Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization’s overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats. We present a framework to help managers understand and assess the various threats associated with the use of wireless technology. We also discuss a number of available solutions for countering those threats.
목차
1. Introduction
2. Wireless Vulnerabilities, Threats and Countermeasures
2.1 Wireless Network Attacks
3. Securing Wireless Transmissions
3.1 Protecting the Confidentiality of Wireless Transmissions
3.2 Preventing Alteration of Intercepted Communications
3.3 Countermeasures to Reduce the Risk of Denial-of-Service Attacks
4. Securing Wireless Access Points
4.1 Countermeasures to Secure Wireless Access Points
5. Securing Wireless Client Devices
6. Securing Wireless Networks
6.1 Use of Encryption
6.2 Use anti-virus and anti-spyware software, and a firewall
6.3 Turn off identifier broadcasting
6.4 Change the identifier on your router from the default
6.5 Change your router’s pre-set password for administration
6.6 Allow only specific computers to access your wireless network
6.7 Turn off your wireless network when you know you won’t use it
6.8 Don’t assume that public “hot spots” are secure
7. Training and Educating Users
8. Network Auditing
9. Conclusion
References