Guide to Wireless Network Security
|
|
|
- Theodora Oliver
- 10 years ago
- Views:
Transcription
1 Guide to Wireless Network Security
2 Guide to Wireless Network Security by John R. Vacca USA Springer
3 John R. Vacca Author and IT Consultant TR 382 Pomeroy, Ohio Library of Congress Control Number: Guide to Wireless Network Security by John R. Vacca ISBN-13: ISBN-10: e-isbn-13: e-isbn-10: Printed on acid-free paper Springer Science+Business Media, LLC All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, LLC, 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America springer.com
4 Dedication This book is dedicated to Hunter,
5 Contents Dedication Preface Foreword Acknowledgments v xi xxi xv PART I: OVERVIEW OF WIRELESS NETWORK SECURITY TECHNOLOGY 1 Chapter 1: Wireless Network Security Fundamentals 3 Chapter 2: Types of Wireless Network Security Technology 57 Chapter 3: Standards 85 Chapter 4: Enhanced Security For Wireless Lans And Wans In The Enterprise: Hands On 115 Chapter 5: Handling Wireless Private Information 151 PART II: DESIGNING WIRELESS NETWORK SECURITY 161 Chapter 6: Wireless Network Security Design Issues 163
6 viii Contents Chapter 7: Cost Justification And Consideration 177 Chapter 8: Standards Design Issues 187 Chapter 9: Authenticating Architectural Design Issues 201 PART III: PLANNING FOR WIRELESS NETWORK SECURITY 213 Chapter 10: Implementation Plan Development 215 Chapter 11: Wireless Network Security Planning Techniques 253 PART IV: INSTALLDsJG AND DEPLOYING WIRELESS NETWORK SECURITY 261 Chapter 12: Testing Techniques 263 Chapter 13: Internetworking Wireless Security 271 Chapter 14: Installation And Deployment 285 Chapter 15: Securing Your Wireless E-Commerce Storefront 295 Chapter 16: Certification Of Wireless Network Security Performance 321 PART V: MAINTAINING WIRELESS NETWORK SECURITY 327 Chapter 17: Configuring Secure Access 329 Chapter 18: Management Of Wireless Network Security 335 Chapter 19: Ongoing Maintenance 345 Chapter 20: Standards Development 353 Chapter 21: Ensuring Site Security 359 PART VI: INFORMATION WARFARE COUNTERMEASURES: THE WIRELESS NETWORK SECURITY SOLUTION 369 Chapter 22: Defensive Wireless Network Security Strategies For Governments And Industry Groups 371
7 Contents ix Chapter 23: The Information Warfare Wireless Network Security Arsenal And Tactics Of The Military 409 Chapter 24: The Information Warfare Wireless Network Security Arsenal And Tactics Of Terrorists And Rogues 459 Chapter 25: The Information Warfare Wireless Network Security Arsenal And Tactics Of Private Enterprises 519 Chapter 26: The Information Warfare Wireless Network Security Arsenal Of The Future 557 Chapter 27: Wireless Network Security Surveillance Tools For Information Warfare Of The Future 601 Chapter 28: Civilian Casualties: The Victims And Refugees Of Information Warfare Wireless Network Security 639 PART VII: RESULTS AND FUTURE DIRECTIONS 681 Chapter 29: Providing Wireless Network Security Solutions For ISP Intranet, Internet And E-Commerce 683 Chapter 30: Enhancing Wireless Web Server Security 735 Chapter 31: Wireless Network Security Solutions For Consideration 745 Chapter 32: Summary, Conclusions, and Recommendations 763 PART VIII: APPENDICES 781 Appendix A: Ensuring Built-in Frequency Hopping Spread Spectrum Wireless Network Security 783 Appendix B: Configuring Wireless Internet Security Remote Access Points 785 Appendix C: Wireless Network Security Management, Resiliency And Security With CDMA 793 Appendix D: List Of Top Wireless Network Security Implementation And Deployment Enterprises 801 Appendix E: List Of Wireless Network Security Products 805
8 Preface 1. INTRODUCTION With the increasing deployment of wireless networks ( architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack. Intrusion detection
9 xii Preface systems (IDSs) and intrusion prevention systems (IPSs)~used in conjunction with information warfare countermeasures-are the latest and most powerful tools for identifying and responding to network- and host-based intrusions. With that in mind, this book begins by discussing the basic access control methods that form the basis of the architecture. These methods are best suited to small wireless networks with low-to-medium security requirements. The book then presents the more-robust virtual private network (VPN)-based security solution that provides better security and scales well to large networks. The book concludes with possible future solutions based on the 802. IX security standard, which enables port-level access control. 2. PURPOSE The purpose of this book is to show experienced (intermediate to advanced) wireless network security professionals how to install and maintain the security of mission-critical wireless data and systems. It also shows through extensive hands-on examples, how you can install and configure firewalls, evaluate, implement and manage wireless secure remote access technologies, and deploy a variety of intrusion detection systems and intrusion prevention systems in conjunction with information warfare countermeasures. 3. SCOPE Throughout the book, extensive hands-on examples will provide you with practical experience in installing, configuring and troubleshooting wireless network security applications and Internet and intranet Firewalls; Virtual Private Networks; intrusion prevention systems and intrusion detection systems. In addition to advanced wireless network security application technology considerations in commercial enterprises and governments, the book addresses, but is not limited to completing the following line items as part of installing wireless network security-based systems: Analyze network traffic and detect attacks using the latest tools and techniques. Authenticate remote users with passwords, security servers and digital certificates. Automate responses to detected intrusions. Be able to describe methods of advanced data modulation.
10 Preface xiii Be able to describe methods of detection, disruption (denial of service or jamming), and interception and understand appropriate countermeasures. Be able to describe the use of wireless security technologies such as frequency hopping, time hopping, direct-sequence spread spectrum, etc. Build a firewall to protect your wireless network. Create an effective response strategy (via information warfare) based on your organizational needs Deploy and manage an IDS and IPS. Deploy Internet and intranet firewalls: hands-on. Deploying intrusion detection systems and intrusion prevention systems: hands-on. Design, configure and deploy an IDS and IPS; and, analyze your current wireless network security risks. Design, install and configure virtual private networks (VPNs). Detect and respond to wireless network- and host-based intruder attacks. Detect attacker scans and probes. Evaluate, install, configure and manage secure virtual private networks (VPNs) for remote users, sites and business partners. Gain extensive hands-on experience installing and configuring a firewall. Gain extensive hands-on experience using an IDS and IPS to identify and respond to intruder attacks. Gain hands-on experience with a range of security tools and techniques for maintaining the integrity of your wireless network security operations. Gain the skills to respond to potential attacks before they become problematic by recognizing the scans and probes used by a potential intruder. Identify buffer overruns, fragmentation and other attacks. Identify methods hackers use to break into wireless network systems. Implement information privacy using standardized encryption techniques. Implement information warfare countermeasures. Implement publicly accessible servers without compromising wireless network security, provide access to HTTP and FTP services on the Internet, and implement a firewall-to-firewall virtual private network (VPN). Integrate intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) into your current network topology Install and configure proxy-based and stateful-filtering firewalls. Knowledge of how attackers break into wireless networks and how an IDS and IPS (used in conjunction with information warfare
11 xiv Preface countermeasures) can play a key role in detecting and responding to these events, Learn about a variety of technologies available, including software, hardware and firewall add-on products. Learn how to allow access to key services while maintaining your enterprise's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). Protect internal IP addresses with Network Address Translation (NAT) and deploy a secure DNS architecture. Select the best secure remote wireless access technologies for your organization. Understand basic electronic countermeasures and electronic countercountermeasures for wireless communications. Understand issues of network communications such as service, confidentiality, authentication, reliability, access control, and availability. Understand the functions of the layers in a wireless communication system. Understand the relationship between network layers, network services and functions. Understand the security problems with wireless transmissions. Using router logging to detect a DoS attack. This book will leave little doubt that a new architecture in the area of advanced wireless network security installation is about to be constructed. No question, it will benefit enterprises and governments, as well as their wireless network security professionals. 4. TARGET AUDIENCE This book is primarily targeted toward domestic and international network and systems administrators; IT administrators; IT managers; wireless network security specialists; computer and network security personnel; security professionals; and, consultants and IT/IS directors who plan to select, implement and maintain secure wireless access solutions for an enterprise. Basically, the book is targeted for all types of people and enterprises around the world that are involved in planning and implementing wireless network security and other wireless Internet systems.
12 Preface 5. ORGANIZATION OF THIS BOOK xv The book is organized into eight parts as well as an extensive glossary of security, wireless network and Internet networking terms and acronyms at the back. It provides a step-by-step approach to everything you need to know about wireless network security; as well as, information about many topics relevant to the planning, design, and implementation of intrusion detection systems and intrusion prevention systems; and, how to conduct information warfare. The following detailed organization speaks for itself. 5.1 Part I: Overview Of Wireless Network Security Technology Part One discusses wireless network security fundamentals; types of wireless network security technology; standards; enhanced wireless network security; and, handling wireless private information. Chapter 1, "Wireless Network Security Fundamentals," presents a classification of denial-of-service attacks according to the type of the target (firewall, Web server, router), a resource that the attack consumes (wireless network bandwidth, TCP/IP stack) and the exploited vulnerability (bug or overload). Chapter 2, *Types of Wireless Network Security Technology," presents some common types of wireless network security technologies to help guide your path. Chapter 3, "Standards," discusses the following wireless network security standards: WEP, IEEE b, IEEE , IEEE 802.1X, Bluetooth, SSL, WTLS, WPA and WPA2. Chapter 4, "Enhanced Security For Wireless Lans And Wans In The Enterprise: Hands On," helps managers get a grasp of basic WLAN and WWANs security issues. Chapter 5, "Handling Wireless Private Information," covers the pitfalls of wireless- LANs and WANs, with regards to the security risks to private information. 5.2 Part II: Designing Wireless Network Security The second part of this book discusses wireless network security- design issues; cost justification and consideration; standards design issues; and, authenticating architectural design issues. Chapter 6, "Wireless Network Security- Design Issues," covers enterprise critical systems security, by first illustrating the importance of and potential difficulties in protecting information that traverses networks; and, then
13 xvi Preface examining wireless network security as a holistic concept before focusing specifically on the IEEE 802. IX enterprise edge security standard. Chapter 7, "Cost Justification And Consideration," assesses the costs associated with the security risks and vulnerabilities to the wireless network. Chapter 8, ''Standards Design Issues," discusses particular aspects of wireless security architecture standards design issues in detail, that can be used for enterprise wireless networks standards design. Chapter 9, ''Authenticating Architectural Design Issues," presents the architecture and the underlying mechanism of the WMTIP. 5.3 Part III: Planning For Wireless Network Security Part Three covers the implementation plan development and wireless network security planning techniques. Chapter 10, "Implementation Plan Development," describes the overall security implementation plan development for wireless networks. Chapter 11, "Wireless Network Security Planning Techniques" briefly discusses wireless network security planning techniques by providing an overview of the security risks and technical challenges in this area, as well as summarizing key recommendations for secure wireless LANs and WWANs Part IV: Installing And Deploying Wireless Network Security Part Four covers testing techniques; internetworking wireless security; installation and deployment; securing your wireless e-commerce storefront; and, certification of wireless network security performance. Chapter 12, "Testing Techniques," focuses more on a cracker attempting to penetrate your wireless network and hacking one of the servers held therein. Chapter 13, "Internetworking Wireless Security," focuses on the concept of performance enhancing proxies (PEPs), which were introduced in a working group of the Internet Engineering Task Force (DETF). Chapter 14, "Installation And Deployment," eases your concerns about the security of wireless networks installations and deployments, by increasing your knowledge on the subject. Chapter 15, "Securing Your Wireless E-Commerce Storefront," focuses on two "flavors" of wireless service, as provided by the WAP Forum and by NTT DoCoMo of Japan. Chapter 16, "Certification Of Wireless Network Security Performance," focuses on IEEE networks, and how the Service Set Identifier (SSID)
14 Preface xvii is viewed by some security professionals as an unneeded advertisement of the wireless network to attackers. It also discusses how these professionals assert that all measures should be taken to hide the SSID. 5.5 Part V: Maintaining Wireless Network Security Part Five covers configuring secure access; management of wireless network security; ongoing maintenance, standards development and ensuring site security. Chapter 17, ''Configuring Secure Access," focuses on how to configure your wireless network security access. Chapter 18, "Management Of Wireless Network Security," focuses on the management of wireless network security. Chapter 19, "Ongoing Maintenance," discusses the ongoing maintenance of integrated wireless network analyzers; and, how they have several advantages over laptop computers and handheld, personal digital assistant (PDA)-style devices, as well as centralized systems. Chapter 20, "Standards Development," focuses on the development of wireless network security standards. Chapter 21, "Ensuring Site Security," focuses wireless network site security and integrity. 5.6 Part VI: Information Warfare Countermeasures: The Wireless Network Security Solution Part Six discusses wireless network security with regards to how to fight against macro threats-defensive strategies for governments and industry groups; the information warfare arsenal and tactics of the military; the information warfare arsenal and tactics of terrorists and rogues; the information warfare arsenal and tactics of private enterprises; the information warfare arsenal of the future; surveillance tools for information warfare of the future; and civilian causalities- the victims and refugees of information warfare. Chapter 22, ''Defensive Wireless Network Security Strategies For Governments And Industry Groups," is an in-depth examination of the implications of IW for the U.S. and allied infrastructures that depend on the unimpeded management of information that is also required in the fight against macro threats-defensive strategies for governments and industry groups. Chapter 23, 'The Information Warfare Wireless Network Security Arsenal And Tactics Of The Military," focuses on two goals. First, you need to find a way to protect yourself against catastrophic events. Second, you
15 xviii Preface need to build a firm foundation on which you can make steady progress by continually raising the cost of mounting an attack and mitigating the expected damage of the information warfare arsenal and tactics of the military. Chapter 24, "The Information Warfare Wireless Network Security Arsenal And Tactics Of Terrorists And Rogues," recommends a number of specific steps that could better prepare the U.S. military and private enterprises to confront "the new terrorism" and its information warfare arsenal and tactics. Chapter 25, "The Information Warfare Wireless Network Security Arsenal And Tactics Of Private Enterprises," deals with the IW tools and strategies of private enterprises and how they're used against the aggressors. It will also help to realistically guide the process of moving forward in dealing with the information warfare arsenal and tactics of private enterprises. Chapter 26, "The Information Warfare Wireless Network Security Arsenal Of The Future," discusses how the increasing dependence on sophisticated information systems brings with it an increased vulnerability to hostile elements, terrorists among them, in dealing with the information warfare arsenal of the future. Chapter 27, "Wireless Network Security Surveillance Tools For Information Warfare Of The Future," discusses the basic concepts and principles that must be understood and that can help guide the process of moving forward in dealing with the surveillance tools for the information warfare of the future. Chapter 28, "Civilian Casualties: The Victims And Refugees Of Information Warfare Wireless Network Security," considers the application of civilian information operations (CIOs) to the conventional warfare environment. Although the array of CIO tools and techniques has been presented as discrete elements in a schematic diagram, the CIO environment is complex, multidimensional, interactive, and still developing. 5.7 Part VII: Results and Future Directions Finally, Part Seven discusses how to provide wireless ISP intranet, Internet and e-commerce solutions; enhance wireless web server security; wireless network security solutions for consideration and finally the summary, conclusions and recommendations. Chapter 29, "Providing Wireless Network Security Solutions For ISP Intranet, Internet And E-Commerce," outlines the new security concerns for an enterprise to deploy Intranets and extranets.
16 Preface xix Chapter 30, ^'Enhancing Wireless Web Server Security," discusses what you can do to protect your wireless Web server from wireless network security risks. Chapter 31, "Wireless Network Security Solutions For Consideration," This chapter describes the various security challenges and solutions for consideration of Wi-Fi wireless LANs; attempts the industry has made to address those challenges; shortcomings of those initial attempts; and, the best possible practices, for enterprises and residential users who want to take advantage of the real benefits of WLANs., Chapter 32, "Summary, Conclusions, and Recommendations," addresses at a summary level, the most significant security risks in the wireless computing environment. The chapter also introduces in a centralized fashion, the scope of the problem and the most significant talking points on the issue of wireless security and to summarize, conclude and recommend where the industry is in addressing these problems and where it is going. Finally, this chapter presents WPA, then end to end encryption, and finally the services appropriate for larger enterprises. 5,8 Part VIII: Appendices Eight appendices provide additional resources that are available for computer forensics. Appendix A shows how to ensure built-in frequency hopping spread spectrum wireless network security. Appendix B shows how to configure wireless Internet security remote access. Appendix C covers wireless network security management, resiliency and security. Appendix D contains a list of top wireless network security implementation and deployment enterprises. Appendix E contains a list of wireless network security products. Appendix F contains a list of wireless network security standards. Appendix G contains a list of miscellaneous wireless network security resources. The book ends with Appendix H~a glossary of wireless network security and information-warfare-related terms and acronyms. 6. CONVENTIONS This book uses several conventions to help you find your way around, and to help you find important sidebars, facts, tips, notes, cautions, and warnings. They alert you to critical information and warn you about problems. John R. Vacca Author and IT Consultant, [email protected] visit us at
17 Foreword The use of wireless networks is increasingly popular among personal, academic, business, and government users. Everyone wants to be connected and everyone wants to be connected with out the need for a physical cable plugged into his or her technology. Mobility is a real requirement for business in the 2V^ century. Wireless networks offer a wide range of benefits to government federal agencies, private sector business and individual citizens. These include increased flexibility and ease of network installation. However, without security electronic communications hold little value of in competitive arena of business management and operations. Wireless networks present significant security challenges, including protecting against attacks to wireless networks, establishing physical control over wirelessenabled devices, and preventing unauthorized deployments of wireless networks. Security professionals, application developers, along with IT and network staff in all types of organizations will eventually need to address wireless network security issues. To secure wireless devices and networks and protect information and systems, it is crucial for user organizations to implement controls such as developing wireless security policies, configuring their security tools to meet policy requirements, monitoring their wireless networks, and training their staffs in wireless security. Ease of installation is often cited as a key attribute of wireless networks. Generally, deployments of wireless networks do not require the complicated undertakings that are associated with wired networks. The ability to connect the network without having to add or pull wires through walls or ceilings or modify the physical network infrastructure can greatly expedite the installation process. As a result, a wireless network can offer a cost-effective alternative to a wired network. In addition to their increased ease of
18 xxii Foreword installation, wireless networks can be easily scaled from small peer-to-peer networks to very large enterprise networks that enable roaming over a broad area. This book provides an extensive analysis of wireless network security practices, procedures, and technologies. Design issues and architectures are also expertly covered. But this book goes beyond theory and analysis to explain numerous implementation issues. This book is written for people that need to cut through the confusion about wireless network security and get down to adoption and deployment. The book starts with the basic concepts and takes readers through all of the necessary learning steps to enable them to effectively secure wireless networks. Michael Erbschloe Security Consultant and Author St. Louis, Missouri
19 Acknowledgements There are many people whose efforts on this book have contributed to its successful completion. I owe each a debt of gratitude and want to take this opportunity to offer my sincere thanks. A very special thanks to my Springer Publishing Editor/CS, Susan Lagerstrom-Fife, without whose initial interest and support would not have made this book possible; and, for her guidance and encouragement over and above the business of being a Publishing Editor. And, thanks to Editorial Assistant, Sharon Palleschi of Springer, whose many talents and skills are essential to a finished book. Many thanks also to Deborah Doherty of Springer Author Support, whose efforts on this book have been greatly appreciated. Finally, a special thanks to Michael Erbschloe who wrote the foreword for this book. Thanks to my wife, Bee Vacca, for her love, her help, and her understanding of my long work hours. Finally, I wish to thank all the organizations and individuals who granted me permission to use the research material and information necessary for the completion of this book.
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
NETWORK INFRASTRUCTURE SECURITY
NETWORK INFRASTRUCTURE SECURITY Network Infrastructure Security Angus Wong Alan Yeung Angus Wong Macao Polytechnic Institute Rua de Luis Gonzaga Gomes Macao Alan Yeung City University of Hong Kong 83 Tat
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
By David G. Holmberg, Ph.D., Member ASHRAE
The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
Enterprise K12 Network Security Policy
Enterprise K12 Network Security Policy I. Introduction The K12 State Wide Network was established by MDE and ITS to provide a private network infrastructure for the public K12 educational community. Therefore,
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Assessing Network Security
Microsoft Assessing Network Security Kevin Lam David LeBlanc Ben Smith Acknowledgments Foreword Introduction xxi xxiii xxvii Parti 1 Introduction to Performing Security Assessments 3 Role of Security Assessments
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Security Requirements for Wireless Local Area Networks
Information Technology Security Guidance Security Requirements for Wireless Local Area Networks Overview ITSG-41 March 2013 Foreword The ITSG-41 Security Requirements for Wireless Local Area Networks document
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
Wireless LAN Security
An ISS Technical White Paper Wireless LAN Security 802.11b and Corporate Networks 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Although a variety of wireless network
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Online Business Security Systems
Online Business Security Systems Online Business Security Systems by Godfried B.Williams University of East London UK Godfried B. Williams School of Computing & Technology University of East London Docklands
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
PCI Security Scan Procedures. Version 1.0 December 2004
PCI Security Scan Procedures Version 1.0 December 2004 Disclaimer The Payment Card Industry (PCI) is to be used as a guideline for all entities that store, process, or transmit Visa cardholder data conducting
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.
VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and
Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: 646-151 Doc Type: Q & A with Explanations Total Questions: 50
Question: 1 Which network security strategy element refers to the deployment of products that identify a potential intruder who makes several failed logon attempts? A. test the system B. secure the network
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Name. Description. Rationale
Complliiance Componentt Description DEEFFI INITION Network-Based Intrusion Detection Systems (NIDS) Network-Based Intrusion Detection Systems (NIDS) detect attacks by capturing and analyzing network traffic.
Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title
Title VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone-Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS
Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Cyber Security Where Do I Begin?
ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Contents. Foreword. Acknowledgments
Foreword Preface Acknowledgments xv xvii xviii CHAPTER 1 Introduction 1 1.1 What Is Mission Critical? 1 1.2 Purpose of the Book 2 1.3 Network Continuity Versus Disaster Recovery 2 1.4 The Case for Mission-Critical
Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.
VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Policies and Procedures
Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI
THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI Introduction. I. VULNERABILITIES AND TECHNOLOGIES. 1. Hackers and Threats. Contending with Vulnerability Realizing Value in Security
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
ECB1220R. Wireless SOHO Router/Client Bridge
Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Firewall Environments. Name
Complliiance Componentt DEEFFI INITION Description Rationale Firewall Environments Firewall Environment is a term used to describe the set of systems and components that are involved in providing or supporting
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper
How Proactive Business Continuity Can Protect and Grow Your Business For most companies, business continuity planning is instantly equated with disaster recovery the reactive ability of a business to continue
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary
Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
