Processes and technology applications sometimes confuse the user. However, but with the management or regulation of wireless information security, it never happened. In fact, these processes form a management business in overcoming a strong risk for a number of physical assets and equipment network also works to protect wireless resources.
Guidelines "Cost Effectiveness" allows an organization to form proper security protection. It is part of the overall wireless strategy. The following point introduces approaches that can be done.
1. Wireless Security Policy and Architecture Design
Policy in terms of security, steps should be taken in good training is the need to include wireless networking as part of the entire safety management system design.
2. Treat Access Point
As an "untrusted", access points need to be identified and evaluated. If it is deemed necessary to be done, a kind of quarantine as "untrusted" devices, before the wireless clients can gain access to the network. This determination means that the placement of a "firewall" was done properly and correctly. Through a virtual private network (VJP), the system can detect interference and make the introduction between access point and intranet or Internet.
3. From the Access Point Configuration Policy
Administrators need the standard security settings for each access point 802.11b before use. These guidelines should cover the SSID (Server Set ID), a key WEP (Wire Equivalent Privacy) and encryption as well as "community word" its SNMP.
4. The discovery of the Access Point
Administrators should regularly track down to a wired network to identify the access point is not unknown. Some methods of recognition of existing 802.11b devices, including detection through "banner string" in the access point to the web or telnet interface. Wireless networks can recognize the access point that is not correct to use "setting monitoring" frequency of 2.4 GHz, which searches 802.11b packets in the air. Parcels may be referred to the IP address.
5. Access Point Security Assessment
Checking the safety factor and the interpretation of penetration accurately identify the access point configuration, default or easily guessed passwords and synonyms, as well as encryption. Router ACLs and firewalls also help to minimize access to an agent and other interfaces.
6. Wireless Client Protection
Wireless clients need to do testing for security problems that have a good and desired results. This procedure must include some of the following points. Distribution of personal firewalls to lock down access to client VPNs addition of encryption and the introduction of what can be provided by 802.11b. In addition, interference detection and response to identify and minimize attacks that occurred from those who forced entry, viruses, trojans and backdoors.
7. Security For Wireless Service Management
Security Service Management helps an organization build an effective security system without any ongoing fees, Security Services Management provides interpretation services to manage, design, deployment, management, and support for the field of information security systems.