preview

Nt1310 Unit 3 Assignment 1

Decent Essays

Wireless network infrastructure has become just another connection method for corporate and home users alike. This rapid acceptance can be attributed from:
• Flexibility and mobility
• Ease of installation
• Lower implementation costs
Wireless security in 802.11 is less robust and has many security flaws that can be exploited by an attacker. Security best practice for wireless networks depends on a defense in depth strategy, with five control layers:
1. Security Policy
2. Network Level Security
3. Host Level Security
4. Application Level Security
5. Logging and Auditing

Security Policy
Organizations should develop a security policy for the wireless LAN infrastructure prior to the implementation stage. In order to have a strong security policy, …show more content…

• Create a policy requiring users to obtain a security training prior to gaining access to the wireless networks.

Network Level Security
The network level security will form the relationships of authentication, encryption and authorization for the wireless network and its connectivity between wireless clients to the internal network. Some recommendations are:
• Isolate the Wireless LAN on a different VLAN (most commonly used) and place a firewall between this VLAN from the corporate internal network.
• Implement RADIUS server for authentication and authorization

Host Security Level
Host level security deals with the access control on the wireless devices such as access points. Some recommendations are:
• Change the SSIDs from its default
• Disable the broadcast SSID option
• Consider configuring access points to filter MAC address, permitting only those permitted.

Application Level Security
Application level security plays a vital part of the defense in depth strategy. Some recommendations that an organization should do are:
• Ensure that client machine have some sort of firewall installed and enabled.
• Ensure that corporate systems are hardened properly, to prevent a

Get Access