Skip to main content

Quick Guide To Protecting Wi-Fi Networks And Users

posted onDecember 15, 2005
by hitbsecnews

Enterprise Wi-Fi deployments often focus on the services provided to in-building or on-site users while mostly ignoring the company's mobile workforce. Laptops, smartphones and PDAs have received significant press attention regarding virus vulnerabilities and corporate risk as a result of physical loss. Mobile device management products such as iAnywhere's Afaria and Intellisync's Systems Management do provide access security as well as operating system and application management policies, but the wireless-specific aspects of most portable devices have not been addressed.

Accidental association--inadvertently associating to an AP (access point)--is one concern. This can happen via Microsoft Window's promiscuous wireless client, which surreptitiously attempts to connect to the first AP that matches an existing profile. Or, depending on how it's configured, it can happen via any AP. Almost a year ago, the media picked up on the "Evil Twin" attack, which occurs when attackers at a hotpot replicate the identity of a good AP, and perhaps even a Web-based authentication scheme, to fool unsuspecting users into connecting to them. Minimally, attackers are able to obtain the hotspot login credentials; in the worst case, they can capture all unencrypted traffic and access any mobile device.

Source

Tags

Wireless

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th