In this activity, you search the Internet to find examples of devices that physically secure wireless components. Select a device and write a summary of it.
Start your Web browser, and perform an Internet search for wireless physical security devices.
Visit several sites, and examine at least three different devices.
Select one device and write a two- to a three-paragraph summary of it. Include details such as the device’s cost, its purpose, how it works, and where to get it. Be sure to cite your sources.
Proofread your paper, and submit it to your instructor.
In this project, you research products that can help you implement company security policies for wireless handheld devices.
Review the list of best practices from the “Best Practices for Wireless Network Security” section earlier in this chapter.
Select three of the best practices, and then search online for products that you can use to implement these practices. Identify three different products that can enforce one best practice each.
Write a report that lists the three best practices you chose and the products that enforce these practices. Describe the advantages and disadvantages of each solution.
Submit the report to your instructor, and be prepared to discuss your findings in class.
The following list summarizes other best practices to follow:
Use strong authentication, such as 802.1x.
Use strong encryption, preferably end to end.
Perform a site survey and place APs strategically.
Make sure that a comprehensive wireless security policy is kept up to date, and that users are trained to follow it.
Change default settings, such as SSIDs.
Avoid using protocols that send traffic in cleartext.
If appropriate, use VPNs for wireless transmissions.
Use wireless IDPSs.
Make sure that all stations use updated antivirus protection.
Make sure that wireless devices use firewalls.
Audit the wireless network periodically.
Monitor your wireless network traffic with the best tools available.
New Oberon's spline wireless access point enclosure
This provides Physical Security and Wireless Signal Transparency, enclosures simplify network deployments state Oberon's new Model 1041-00 wireless LAN access point mount is a 12 inch by 12 inch (305 mm by 305 mm) concealed spline (or concealed tee) ceiling tile designed specifically secure the Cisco series 1140, 1260, 3500, and 3600 wireless access points. This access point installs into the ceiling runners like a standard concealed spline tile. The access point is securely flush to the ceiling, making for an aesthetic installation and providing ideal, unobstructed wireless coverage.
The Model 1041-00 provides the physical security network designers require. In addition to thorough compatibility testing enclosures for a wide array of wireless equipment, Oberon has designed enclosures to simplify the rigorous infection control procedures of the healthcare sector and provide the physical security vital to government, education, retail, and banking environments. Oberon manufactures enclosures and mounting solutions for wireless LAN access points. A wide variety of models are available for mounting equipment in both suspended and hard-lid ceilings, on walls, and in outdoor/NEMA environments. Telecommunications enclosures for networking components are also offered for both office and home environments. Enclosures provide security through locking doors, convenience of access to simplify maintenance, and a sleek, aesthetic appearance.
Oberon's wireless enclosures and antenna products are used where the RF coverage, infrastructure security, environmental robustness, and aesthetics are paramount in the network design and implementation.
"https://news.thomasnet.com/fullstory/wireless-access-point-enclosure-provides-physical-security-609640"
"http://www.oberonwireless.com/"
Best practices
1.Turn off the wireless network when not necessary
In a business that is 24×7 this is obviously not an option. Shuting down is the only measure that makes an attack impossible. Additionally if you can shut down any computers, do this, as well. Shutting down individual devices will limit the computers’ exposure to risk as well. By shutting down every wireless device possible, you reduce the devices’ chances of taking a power hit, such as a surge or dip that could compromise the operations of the device or its critical data.
2.Change the default IP address and credentials on your Wireless products
If you continue to use the default IP subnet and IP address for a wireless device, you will be making hackers’ jobs easier. Change the IP subnetwork whenever possible. Always change the default IP addresses of your wireless access points and routers. Most wireless devices come pre-set with a default username and password, which one uses to connect to and install your devices. This makes interaction easy but also makes it easy for others to guess credentials. Make sure both the username and password are changed. A good password should be at least 20 characters long and include numbers, letters, and various symbols. One way to do this is to change them at a regular interval in case they are compromised. Disadvantageous when we can't cope with complexity of managing number of passwords.
3. Disable Remote Access aka Remote Administration
Most wireless devices allow one to access its user interface from a directly connected device (via a cable that facilitates serial communication). However, many products allow access from remote systems as well. Disabling Remote Access or Remote Administration will make it much more difficult for an unauthorized user to gain access. When this functionality is necessary, filter by allowing certain IP blocks to specific IP addresses and open only the exact protocols used for communications.
Get Answers For Free
Most questions answered within 1 hours.