Enterprise A Closer Look at Wireless Intrusion Detection:
|
|
|
- Cori Dennis
- 10 years ago
- Views:
Transcription
1 White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher
2 Introduction As wireless enterprise networks become more pervasive, increasingly sophisticated attacks are developed to exploit these networks. In response, many organizations consider the deployment of wireless intrusion protection and wireless intrusion detection systems (WIPS/WIDS). These systems can offer sophisticated monitoring and reporting capabilities to identify attacks against wireless infrastructure, while stopping multiple classes of attack before they are successful against a network. Organizations have several options when selecting an architecture for WIDS deployment. These include an overlay approach, which uses dedicated sensors to create an overlay security network; integrated monitoring, which relies on dual-purpose transmission/sensor equipment that also carries customer traffic; and a hybrid approach, which uses elements of both of the other architectures. A closer look at deployment options shows that there are unique benefits and weaknesses associated with each. However, the hybrid model tends to offer the most flexibility and security because it provides focused analysis mechanisms, increased flexibility in deployment and powerful attack detection and response mechanisms. To maximize the benefits of a hybrid approach, however, vendor alternatives must be closely scrutinized to ensure that the vendor provides certain capabilities that are required to fully support a hybrid WIDS deployment. Such capabilities include an integrated identity-based ICSA-certified firewall and extensive wireless intrusion protection capabilities to ensure that the network can respond effectively in the event of an internal or external attack. Deployment Approaches Wireless intrusion detection methodologies have diverged among wireless and security vendors. When selecting a WIDS vendor, it is important to first understand the deployment methodologies supported by each system. The available WIDS deployment models include overlay, integrated, and hybrid. Overlay Monitoring In an overlay monitoring deployment, organizations augment their existing WLAN infrastructure with dedicated wireless sensors or Air Monitors (AMs). The AMs are connected to the network in a manner similar to access points (APs). They can be deployed in ceilings or on walls and supported by power over Ethernet (PoE) injectors in wiring closets. While APs are responsible for providing client connectivity, AMs are primarily passive devices that monitor the air for signs of attack or other undesired wireless activity. In an overlay WIDS system, the WIDS vendor provides a controller in the form of a server or appliance that collects and assesses information from the AMs that is monitored by an administrator. These devices do not otherwise participate with the rest of the wireless network, and are limited to assessing traffic at the physical layer (layer 1) and the data-link layer (layer 2). Aruba Networks A Closer Look at Wireless Intrusion Detection: 1
3 Overlay WIDS Example Integrated Monitoring In an integrated monitoring deployment, organizations leverage existing access point hardware as dualpurpose AP/AM devices. APs are responsible for providing client connectivity in an infrastructure role, and for analyzing wireless traffic to identify attacks and other undesired activity at the same time. This is often a less-costly approach compared to overlay monitoring, since organizations use existing hardware for both monitoring and infrastructure access without the need for additional sensors or an overlay management controller. Integrated WIDS Example Hybrid Monitoring A hybrid monitoring approach leverages the strengths of both the overlay and integrated monitoring models. A hybrid approach uses both dual-purpose APs and dedicated AMs for intrusion detection and protection. Organizations can use an existing deployment of APs and augment that protection with dedicated AMs, or deploy a dedicated monitoring infrastructure consisting solely of AM devices. In either case, analysis is 2 A Closer Look at Wireless Intrusion Detection: Aruba Networks
4 performed by a centralized controller similar to what is used with an overlay model, rather than the approach used in an integrated WIDS deployment, where processing is handled by distributed access points. Hybrid WIDS Example Strengths of Hybrid Monitoring The hybrid WIDS deployment model offers several advantages over the integrated or overlay models including increased flexibility in deployment, focused analysis mechanisms, more comprehensive attack detection and powerful response mechanisms. Deployment Flexibility By leveraging the benefits of an integrated monitoring model, organizations that have dual-purpose APs deployed for wireless access can take advantage of their existing hardware investment while gaining the security advantages of centralized WIDS monitoring and reporting. In a centralized encryption and processing model, all wireless traffic is handled at an Access Controller (AC). Unlike an integrated WIDS deployment that uses the limited processing capabilities of distributed access points for analysis, a centralized AC can provide the additional resources needed for intensive WIDS analysis. Alternatively, organizations looking to augment their existing wireless infrastructure with a WIDS monitoring component can deploy a hybrid WIDS network using AM devices. Although the cost structure is similar to that of a standard overlay network, the advantage is that, unlike with a standard overlay network, some AMs are not limited to performing only WIDS monitoring, and can be dynamically changed from an AM to an infrastructure AP as needed. This allows organizations to deploy AMs today to meet their monitoring needs, with the option of adding APs in the future for wireless infrastructure networking. Aruba Networks A Closer Look at Wireless Intrusion Detection: 3
5 Focused Analysis A major benefit of the hybrid model is that it allows organizations to apply WIDS techniques not only to traffic from their own infrastructure, but also to any wireless traffic within range of deployed AMs. This approach provides stronger analytical capabilities than either the overlay or integrated WIDS approach. In an integrated WIDS deployment, infrastructure APs are responsible for assessing traffic to identify attacks. While this is the best approach for monitoring the authorized infrastructure network, it is limited in its ability to assess threats on wireless channels and frequencies other than those for which the wireless network is currently configured. The most significant limitation in the integrated WIDS deployment model is the inability to freely scan other frequencies for attack activity, including rogue AP devices. When the access point is responsible for providing client connectivity and responding to traffic sent by associated wireless clients, it is not free to scan other frequencies for attack activity. (This scanning capability is also known as channel hopping). While some integrated deployment vendors have augmented their APs to scan other channels, there is a significant performance detriment: stations cannot transmit or receive traffic while the AP is scanning other channels. In an overlay WIDS network, dedicated AMs are responsible for analyzing wireless traffic, and are usually deployed with a channel hopping algorithm so they can analyze traffic on all available frequencies. This approach is effective at identifying noisy attacks, such as a rogue AP that is transmitting frequent beacon frames, or a flood attack, as is common with IEEE denial of service (DoS) vulnerabilities. However, because AMs are configured for channel hopping, they are not the most appropriate monitoring mechanism for analyzing a wireless network that is operating on a single channel for a given area. While the AM is scanning other frequencies, it is likely that the sensor will miss attacks that target the production network. Further, AMs are often deployed with no knowledge of the operating characteristics of the production network. Even if the AM is configured to monitor a single channel that is used by the production network for a given area, the channel selection and configuration is applied independently of the AP. If the administrator changes the channel configuration of the AP or if the AP changes the channel configuration dynamically to avoid interference with other RF sources, the AM must be adjusted to reflect this change as well. This can represent a significant operating burden for the WIDS administrator in the best case, or the inability to monitor the production network altogether in the worst case. Fortunately, a hybrid approach from the right vendor can address the limitations of both overlay and integrated monitoring systems. By augmenting the integrated wireless infrastructure with AM devices, the hybrid model has the freedom to perform analysis while channel hopping to identify rogue AP devices and attacks on channels not currently used by infrastructure components. To mitigate the intermittent monitoring 4 A Closer Look at Wireless Intrusion Detection: Aruba Networks
6 capabilities of an AM that is channel hopping, all traffic should pass through a centralized access controller and should be subject to WIDS analysis, thus providing a constant monitoring mechanism. Location Services The ability to locate the source of an attack or potentially problematic areas is another valuable feature for WIDS systems. Nearly all WIDS vendors offer some sort of location-based identification service, with varying degrees of success. Location services are commonly implemented by examining the receive signal strength of frames based on the source MAC address and triangulating the information with data from other sensors to estimate the location of the transmitter. While this mechanism works well for unsophisticated attacks such as rogue AP identification, it does not provide reliable location reporting when an attacker uses MAC spoofing attack techniques. In a MAC spoofing attack, the attacker will transmit malformed frames into the network by impersonating a valid station or access point. This is problematic for location reporting algorithms, since the algorithm is unable to differentiate legitimate and illegitimate receive signal strength indication (RSSI) for the same source MAC address. Vendors that implement a WIDS implementation where the data path is integrated and all encrypted traffic is terminated at a centralized mobility controller will have unique visibility into the network to easily identify and discard spoofed frames from an attacker. This approach enables the system to more reliably identify the location of an attacker, rather than the legitimate client system. Comprehensive Attack Detection An additional limitation of an overlay WIDS network is the inability to assess the contents of encrypted wireless traffic. An overlay WIDS approach is heavily focused on the assessment of physical layer (layer 1) and data-link layer (layer 2) traffic. When organizations deploy strong encryption mechanisms (operating at higher layers) to protect the wireless network such as WPA/WPA2 or IPSec/VPN, the overlay vendor's AM becomes unable to assess the contents of encrypted wireless traffic. This weakness in WIDS systems is readily recognized by attackers, who may choose to target vulnerable wireless stations with upper-layer protocol weaknesses such as those found in the client operating system. Information security professionals agree that the majority of attacks initiate within the organization, making wireless networks a prime candidate for an insider to exploit local workstations while evading WIDS monitoring capabilities. A hybrid WIDS approach solves this problem with centralized encryption in the access controller. With centralized encryption, the AC has knowledge of all dynamic encryption keys used for WPA/WPA2 and Aruba Networks A Closer Look at Wireless Intrusion Detection: 5
7 IPSec/VPN networks, and is able to decrypt packets in real-time to assess all layers of wireless traffic. This allows organizations to integrate traditional intrusion detection systems such as Snort with the AC for a comprehensive assessment of attacks on the wireless network. This is an advantage over the traditional overlay model, which does not have knowledge of dynamic encryption keys to decrypt traffic. The disadvantage of the integrated approach, on the other hand, is that distributed AP hardware does not offer a centralized location for an IDS sensor to inspect traffic. Powerful Attack Response To mitigate attacks on the wireless network, WIDS vendors have augmented the analysis components of their products with reactive components, often known as Wireless Intrusion Prevention Services (WIPS). When the analysis mechanism recognizes an attack, such as an attempt at accelerated WEP key cracking, the wireless device reacts to the event by reporting it to the administrator and by taking steps to prevent the attack from succeeding. In an overlay WIDS implementation, the AMs are not involved in the management and operation of the wireless infrastructure and must seek an alternate mechanism for stopping an attacker from communicating on the network. The common mechanism implemented among overlay vendors is to take the previously passive AM device and turn it into an active device that mounts a counter-attack, often deployed as a DoS attack against the wireless station. While this technique is suitable for defending against rogue AP threats, it has the disadvantage of taking an otherwise passive device (the AM) and turning into an active device. This allows the attacker to use traffic fingerprinting techniques to determine sensitive information about the network, including the characteristics of any WIDS system present. This information gives the attacker an additional opportunity to exploit the network, and to possibly evade detection by the WIDS system altogether. In an integrated WIDS implementation using distributed APs for wireless transport and monitoring, an AP that detects an attack can simply terminate network connectivity for the offending client station, updating a local blacklist of stations that should no longer be allowed to use the network. This is an effective mechanism for stopping access at a single AP, but it does not offer protection when the attacker roams to another AP. In order to be effective, the client must be blacklisted at every location in the network, independent of the AP with which the client attempts to associate. This is best accomplished with a hybrid solution that uses a centralized access controller that integrates an identity-based ICSA-certified firewall. Integration of a firewall allows for automatic synchronization of the entire WLAN to take the same action against a blacklisted target. Advantages of an Aruba Hybrid Solution Aruba Networks provides a comprehensive hybrid deployment approach, giving customers the greatest level of flexibility. In addition, an Aruba solution provides advanced encryption, authentication and access control 6 A Closer Look at Wireless Intrusion Detection: Aruba Networks
8 mechanisms that are unique to its centralized architecture. Extensive wireless intrusion protection capabilities along with an integrated policy enforcement firewall make an Aruba solution unrivaled in its ability to contain intrusion threats Blacklisting Unlike the integrated deployment model using distributed processing on individual access points, the Aruba hybrid approach can centrally blacklist an offending workstation to prevent all access to the network. With this approach, the wireless client is lead to believe that the infrastructure network has effectively disappeared from its view. This functionality is enabled by a stateful ICSA-certified firewall integrated in the Aruba Mobility Controller. The firewall provides blacklist rules that will apply throughout the entire network, regardless of where the offending user or device attempts to roam or re-authenticate. Dynamic Role Changes Another benefit of the Aruba hybrid approach for WIPS service is the ability to dynamically change the access privileges of a wireless client using the integrated role-based firewall. When the Aruba Mobility Controller recognizes a configured event from a wireless station (such as a traffic policy violation), the network access privileges of the client can be dynamically changed, thereby restricting the client's access to network resources. In contrast to segmenting users into common broadcast domains using VLANs, firewall roles are a much more secure, scalable and flexible way to segregate user groups and can be easily adjusted as required. Support for Devices with Weak Encryption A common requirement for enterprise wireless networks is to improve security for devices with legacy encryption mechanisms such as WEP. In many cases, organizations recognize the weaknesses in the WEP protocol but must support WEP networks for legacy devices such as handheld scanners or VoIP phones. Such support is difficult to achieve without exposing the organization to attacks that exploit weaknesses in the WEP protocol. The Aruba solution allows an administrator to assign restrictive firewall policies to devices that connect with legacy encryption mechanisms, ensuring that they cannot compromise network security. For example, a VoIP handset can be allowed to communicate using SIP only to the VoIP gateway. Legacy Protocol Support By leveraging dynamic role assignments in the Aruba hybrid approach, organizations can limit their exposure with legacy wireless protocols. An administrator can establish network privilege assignments for legacy devices that will only grant access to the servers, networks and ports that are required. Under normal traffic conditions, this satisfies the needs of handheld scanners or VoIP phones so they can operate as needed to support the organization. Network Access Policy Enforcement In the event that an attacker attempts to exploit the network and gain access to network resources that are not explicitly permitted, the Aruba solution dynamically revokes privileges for the station. The level of privilege that is revoked is identified by the administrator and can range from blacklisting the client to Aruba Networks A Closer Look at Wireless Intrusion Detection: 7
9 revoking access to specific services. The system can even notify the station that it has violated a network policy, including instructions for how to restore its network privileges. Conclusion Organizations have many options for WIDS/ WIPS service offerings, each presenting various strengths and weaknesses. Overall, a hybrid approach offers distinct advantages over alternative models by offering deployment flexibility, focused analysis and improved attack detection and response capabilities. When selecting a vendor to add intrusion detection and protection to the wireless infrastructure, carefully consider the architecture of the vendor's offering to truly understand the strengths and limitations of the product. 8 A Closer Look at Wireless Intrusion Detection: Aruba Networks
10 About Aruba Networks, Inc. Aruba securely delivers the enterprise network to users, wherever they work or roam, with user-centric networks that significantly expand the reach of traditional port-centric networks. User-centric networks integrate adaptive WLANs, identity-based security, and application continuity services into a cohesive, highperformance system that can be easily deployed as an overlay on top of existing network infrastructure. Adaptive WLANs deliver high-performance, follow-me connectivity so users are always within reach of mission-critical information. Identity-based security associates access policies with users, not ports, to enable follow-me security that is enforced regardless of access method or location. Application continuity services enable follow-me applications that can be seamlessly accessed across WLAN and cellular networks. The cost, convenience, and security benefits of user-centric networks are fundamentally changing how and where we work. Listed on the NASDAQ and Russell 2000 Index, Aruba is based in Sunnyvale, California, and has operations throughout the Americas, Europe, Middle East, and Asia Pacific regions. To learn more, visit Aruba at Aruba Networks, Inc. All rights reserved. Specifications are subject to change without notice. Aruba Networks, BlueScanner and RFprotect are trademarks of Aruba Networks, Inc. All other trademarks or registered trademarks are the property of their respective holders. WP_WID_US_ Aruba Networks A Closer Look at Wireless Intrusion Detection: 9
11 1322 Crossman Ave. Sunnyvale, CA Tel Fax Aruba Networks, Inc. All rights reserved. Aruba Networks, BlueScanner and RFprotect are trademarks of Aruba Networks, Inc. All other trademarks or registered trademarks are the property of their respective holders. All rights reserved. Specifications are subject to change without notice.
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis
Dedicated Air Monitors? You Decide.
Tech Brief Enterprise Dedicated Air Monitors? You Decide. Introduction Aruba customers commonly ask: Do I need dedicated air monitors in an Aruba deployment, or can I get by with just access points? The
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Aruba s Mobile Voice Continuity Solution
Tech Brief Enterprise Aruba s Mobile Voice Continuity Solution Introduction There is much evidence that Enterprises are ready for a dual-mode Wi-Fi Cellular mobility solution: this is clear from the technical
Help Desk Guide. Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite
Help Desk Guide Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite Overview In a typical IT organization, it is the Help Desk s job to take incoming user support calls and determine
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy Table of Contents Introduction 3 Using AirWave RAPIDS to detect all rogues on your network 4 Rogue device
Solving the Sticky Client Problem in Wireless LANs SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS. Aruba Networks AP-135 and Cisco AP3602i
SOLVING THE STICKY CLIENT PROBLEM IN WIRELESS LANS Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab May 2013 Statement of test result confidence Aruba makes every attempt
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
Connect Every K-12 Laptop... Wirelessly, Effortlessly, Securely
White Paper Education Connect Every K-12 Laptop... Wirelessly, Effortlessly, Securely Brad Noblet BN Consulting Former CIO, Dartmouth College Overview The increased use of laptop computers in K-12 schools
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
Looking For Trouble: Emergency Call Handling Using Aruba Wireless LANs
Tech Brief Looking For Trouble: Emergency Call Handling Using Aruba Wireless LANs March 2009 Peter Thornycroft Aruba Networks 1 Introduction Should we or a colleague need to make an emergency services
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS
CORPORATE OVERVIEW ARUBA NETWORKS DESIGNS AND DELIVERS MOBILITY-DEFINED NETWORKS THAT EMPOWER A NEW GENERATION OF TECH-SAVVY USERS who rely on their mobile devices for every aspect of work and personal
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Network Access Control in Virtual Environments. Technical Note
Contents Security Considerations in.... 3 Addressing Virtualization Security Challenges using NAC and Endpoint Compliance... 3 Visibility and Profiling of VMs.... 4 Identification of Rogue or Unapproved
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
Best Practices in Deploying a Secure Wireless Network
Best Practices in Deploying a Secure Wireless Network CONTENTS Abstract 2 Today s concerns 2 Purpose 2 Technology background 3 Today s challenges 4 Key security requirements of an integrated network 4
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
Wireless Best Practices For Schools
A COSN BEST PRACTICES WHITE PAPER Wireless Best Practices For Schools Guidelines for School System Leaders Brought to you by April 2015 Table of Contents Executive Overview... 3 Coverage and RF Considerations...
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
Aruba-Certified Design Expert (ACDX) Study Guide
Aruba-Certified Design Expert (ACDX) Study Guide Table of Contents Introduction Prerequisites for the ACDX Exam Format Software Versions Exam Deliverables Exam Equipment Scheduling and Paying for an Exam
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
Deploying a Secure Wireless VoIP Solution in Healthcare
Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Cisco Unified Wireless Network Solution Positioning for the New PCI DSS Wireless Guideline
Cisco Unified Wireless Network Solution Positioning for the New PCI DSS Wireless Guideline This document directly addresses the recommendations listed in the Information Supplement: PCI DSS Wireless Guideline.
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Firewall and UTM Solutions Guide
Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers
Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise Voice Services
Tech Brief Enterprise Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise Voice Services Aruba Delivers the Optimal Wireless LAN Infrastructure for High-Quality Enterprise
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time
IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Using Wireless Mesh Networks for Video Surveillance Version: 1. Using Wireless Mesh Networks for Video Surveillance
Using Wireless Networks for Video Surveillance Version: 1 White Paper Using Wireless Networks for Video Surveillance Using Wireless Networks for Video Surveillance Version: 1 White Paper Table of Contents
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
Mobilize to Rightsize Your Network
Mobilize to Rightsize Your Network Table of Contents How enterprise mobility can reduce the total cost of network ownership by 70 percent 3 Mobility means cost savings 3 Getting started on savings 4 Make
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
White Paper. Improve Air Quality by Minimizing SSIDs: Using Role-Based Access to Increase Wi-Fi Application Performance
White Paper Improve Air Quality by Minimizing SSIDs: Using Role-Based Access to Increase Wi-Fi Application Performance October 2010 Table of Contents Improve Air Quality by Minimizing SSIDs: Using Role-Based
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
