Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 01_ocred_fax_ocred.pdf
Document Details
Uploaded by barrejamesteacher
null
EC-Council
Tags
Related
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 01_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 03_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 04_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 02_ocred_fax_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 03_ocred_fax_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 04_ocred_fax_ocred.pdf
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Module Flow Discuss Different Types...
Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Module Flow Discuss Different Types Understand Wireless Network of Wireless Network Encryption Mechanisms ARuthentication Authentication Methods Discuss and Implement Understand Wireless Wireless Network Network Fundamentals Security Measures Discuss and Implement Wireless Network Security Measures The objective of this section is to explain the various security measures that must be implemented to secure the wireless network. Module 11 Page 1454 Certified Cybersecurity Technician Copyright © by EG-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Wireless Network Security Measures Wireless Network Security Techniques Create an inventory of wireless Sk dovices 01 05 Defend against WPA cracking Placement of the wireless AP o0 2. Detect rogue APs and antenna Disable SSID broadcasting E fiE Locate rogue APs Select a strong wireless 04.0 08 Configure the security on encryption mode o wireless routers Wireless Network Security Measures A wireless network can be insecure if proper care has not been taken while configuring it. Insecure configurations can pose a great risk to the wireless networks. Thus, a wireless network should be configured as per the wireless security policy of the organization. The following points should be clearly stated in the organization’s wireless security policy: = |dentity of the users who are using the network = Determine whether the user is allowed access or not = (Clearly define who can and cannot install the APs and other wireless devices in the enterprise = Describe the type of information that users are allowed to communicate over the wireless network = Provide limitations on APs such as location, cell size, frequency, etc., in order to overcome the wireless security risks = (Clearly define the standard security settings for wireless components = Describe the conditions in which wireless devices are allowed to use the network Furthermore, a successful and effective wireless security implementation should involve the following: = Centralized implementation of security measures for all wireless technology = Security awareness and training programs for all employees Module 11 Page 1455 Certified Cybersecurity Technician Copyright © by EC-Council EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security = Standardized configurations to reflect the security policies and procedures of the organization = Configuration management and control to make sure the latest security patches and features are available on wireless devices. The following activities help in defending and maintaining the security of a wireless network: = (Creating an inventory of the wireless devices = Placement of the wireless AP and antenna = Disable SSID broadcasting = Selecting a strong wireless encryption mode = Defending against WPA cracking = Detecting rogue APs = Locating rogue access points = Configuring the security on wireless routers Module 11 Page 1456 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security Creating an Inventory of Wireless Devices Q Identify and document all the client devices according to the make/models/applications, encryption, e firmware, wireless channel, etc. Q This helps the network defenders to manage and monitor the wireless devices in the network Acrylic Wi-Fi HeatMaps.. et Oreratn Strongest Best Maximum [ P 8 Authentication = Firmware Output System o : ? Mode Level Power. A Intermec K31 Win CE.NET WPA2/802.1x 4.20 b/g 17 dBm (Can LU AIrpcap D etwork details (M| [B Third floor hotel12d[Ext + TejadosTran: Assisted Passive - Sean Airnean Active surv < e bj. (2) _ — (32/:33) > - ? APs 4 |MacAddress |SSID Blueprint O Hotel_Rooms Survey route FC 15 Hotel_Rooms 1 Access Point position 1% Hotel_Rooms 11 Passive survey FC :26:1A Hotel_Rooms g Active survey 5 £% Hotel_Rooms 1 2 O Hotel_Rooms 5 BE:AZ:86:05:9F:6F Hotel_Rooms 6 /s Oupu foider: Di\test - T Report ce = F 7 h ] v it Esimated report size: 1 pages Generate Figure 11.13: Screenshot of Acrylic Wi-Fi HeatMaps Operatin Strongest Best 802.11 | Maximum # Make Model P & Authentication | Firmware | Radio Output System Mode Level Type Power A Intermec CK31 Win CE.NET WPA2/802.1x 4.20 b/g 17 dBm Windows B Symbol 9090G. WPA2/802.1x 5.1.70 a/b/g 20 dBm Mobile c| Vocollect | Telkman T5 | Proprietary Voice WPA-PSK 420 | bonly | 12dBm D Symbol 6846 MS-DOS WEP - b only 20 dBm E | XybernautAtigo | S310LX | Windows XP | WPA2/802.1x 5.0 a/b/g 20 dBm Table 11.3: Wireless device inventory Module 11 Page 1458 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.