Page 786 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 786

Wireless Networks


               Wireless networking is a popular method of connecting corporate and
               home systems because of the ease of deployment and relatively low
               cost. It has made networking more versatile than ever before.

               Workstations and portable systems are no longer tied to a cable but
               can roam freely within the signal range of the deployed wireless access
               points. However, with this freedom come additional vulnerabilities.
               Historically, wireless networking has been fairly insecure, mainly
               because of a lack of knowledge by end users and organizations as well

               as insecure default configurations set by device manufacturers.
               Wireless networks are subject to the same vulnerabilities, threats, and
               risks as any cabled network in addition to distance eavesdropping,
               packet sniffing, and new forms of DoS and intrusion. Properly
               managing wireless networking for reliable access as well as security
               isn’t always an easy or straightforward proposition. This section
               examines various wireless security issues.


               Data emanation is the transmission of data across electromagnetic
               signals. Almost all activities within a computer or across a network are
               performed using some form of data emanation. However, this term is
               often used to focus on emanations that are unwanted or on data that is
               at risk due to the emanations.

               Emanations occur whenever electrons move. Movement of electrons
               creates a magnetic field. If you can read that magnetic field, you could

               re-create it elsewhere in order to reproduce the electron stream. If the
               original electron stream was used to communicate data, then the re-
               created electron stream is also a re-creation of the original data. This
               form of electronic eavesdropping sounds like science fiction, but it is
               scientific fact. The United States (U.S.) government has been
               researching emanation security since the 1950s under the TEMPEST
               project.


               Protecting against eavesdropping and data theft requires a
               multipronged effort. First, you must maintain physical access control
               over all electronic equipment. Second, where physical access or
               proximity is still possible for unauthorized personnel, you must use
   781   782   783   784   785   786   787   788   789   790   791