Continuation of a series of articles devoted to issues of modern threats, attack scenarios and countermeasures. This time we will look at examples of detecting attacks on wireless networks . Today, wireless networks are one of the main ways to communicate devices, and prohibiting the use of Wi-Fi in companies is not the best practice for information security. Employees are starting to bring their own portable Wi-Fi routers simply because using Wi-Fi is convenient, while for a company such a device installed by an inexperienced user is a serious security breach. The use of Wi-Fi is a good practice for monitoring the radio environment, as well as identifying rogue devices. In companies that are audited for PCI DSS compliance , for example, this practice should be well known.
Consider the main components for building a wireless security system:
access control;
user authentication;
traffic encryption;
wireless intrusion prevention system;
system for detecting foreign devices and the possibility of their active suppression;
monitoring radio and DoS attacks;
wireless network vulnerability monitoring and vulnerability auditing capabilities;
functions to enhance the security of the wireless network infrastructure, for example, device authentication (X.509, etc.), management data protection - MFP / Management Frame Protection.
In the previous article, " Career in Information Security, " we gave several examples of utilities for analyzing the security of a Wi-Fi environment. For more information, we decided to prepare a free webinar dedicated to this topic, as part of the initial ( Zero Security: A ) and professional ( Corporate Laboratories ) information security training program: ')