🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 01_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Module Flow Discuss Different Types Understand Wireless Network of Wireless Network Authentication Methods Encryption Mechanisms Discuss and Implement Wireless Network Security Measures Understand Wireless Network Fundamentals...

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Module Flow Discuss Different Types Understand Wireless Network of Wireless Network Authentication Methods Encryption Mechanisms Discuss and Implement Wireless Network Security Measures Understand Wireless Network Fundamentals Discuss and Implement Wireless Network Security Measures The objective of this section is to explain implemented to secure the wireless network. Module 11 Page 1454 the various security measures that must be Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Wireless Network Security Measures Wireless Network Security Techniques Create an inventory of wireless 01 Placement of the wireless AP and antenna 0 2 Sk Disable SSID broadcasting Select a strong wireless encryption mode 05. E 04 Defend against WPA cracking Detect rogue APs fiE 0 o Locate rogue APs 08 Configure the security on wireless routers Wireless Network Security Measures A wireless network can be insecure if proper care has not been taken while configuring it. Insecure configurations can pose a great risk to the wireless networks. Thus, a wireless network should be configured as per the wireless security policy of the organization. The following points should be clearly stated in the organization’s wireless security policy: = |dentity of the users who are using the network = Determine whether the user is allowed access or not = (Clearly define who can and cannot install the APs and other wireless devices in the enterprise = Describe the type of information that users are allowed to communicate over the wireless network = Provide limitations on APs such as location, cell size, frequency, etc., in order to overcome the wireless security risks = (Clearly define the standard security settings for wireless components = Describe the conditions in which wireless devices are allowed to use the network Furthermore, a successful and effective wireless security implementation should involve the following: = Centralized implementation of security measures for all wireless technology = Security awareness and training programs for all employees Module 11 Page 1455 Certified Cybersecurity Technician Copyright © by EG-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 = Standardized configurations to reflect the security policies and procedures of the = Configuration management and control to make sure the latest security patches and features are available on wireless devices. organization The following activities help in defending and maintaining the security of a wireless network: = (Creating an inventory of the wireless devices = Placement of the wireless AP and antenna = Disable SSID broadcasting = Selecting a strong wireless encryption mode = Defending against WPA cracking = Detecting rogue APs = Locating rogue access points = Configuring the security on wireless routers Module 11 Page 1456 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Creating an Inventory of Wireless Devices Q e Identify and document all the client devices according to the make/models/applications, encryption, firmware, wireless channel, etc. Q. [ o This helps the network defenders to manage and monitor the wireless devices in the network Acrylic Wi-Fi HeatMaps. et : Oreratn P 8 System ?. (Can - C: hotel12d[Ext + TejadosTran: Assisted Airpcap A LU AIrpcap Sean e ? bj APs. (2) _ 4 Blueprint Airnean Passive survey foider: |SSID (32/:33) > O 15 Hotel_Rooms Hotel_Rooms 1 1% Hotel_Rooms 11 £% 2 O BE:AZ:86:05:9F:6F Hotel_Rooms Hotel_Rooms Hotel_Rooms 1 5 6 FC Access Point position FC Active survey — |MacAddress Survey route Oupu X surv - /s = Scan 8 (M| D D Active 0O hotel12c[ExtTransp + Motiv: Assisted Scan 4 [ Ground floor [:] s— Site Survey Summary -. Calibration Report Type | Standard I D < Exam 212-82 :26:1A Hotel_Rooms g 5 Di\test T - Report F ce = 7 h ] v it Esimated report size: 1 pages Generate Figure 11.13: Screenshot of Acrylic Wi-Fi HeatMaps Operatin P Strongest A Intermec CK31 Win CE.NET WPA2/802.1x 4.20 b/g 17 dBm B Symbol 9090G Windows. Mobile WPA2/802.1x 5.1.70 a/b/g 20 dBm c| Vocollect WPA-PSK 420 D Symbol MS-DOS WEP - b only 20 dBm | Windows XP | WPA2/802.1x 5.0 a/b/g 20 dBm 6846 E | XybernautAtigo | S310LX | Firmware | Radio Level Type | Maximum Model | Telkman | Proprietary T5 Voice Authentication Mode 802.11 Make System & Best # Output Power | bonly | 12dBm Table 11.3: Wireless device inventory Module 11 Page 1458 Certified Cybersecurity Technician Copyright © by EC-Gouncil All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser