Page 800 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 800

8.  Treat wireless as external access, and separate the WAP from the
                    wired network using a firewall.

                9.  Treat wireless as an entry point for attackers, and monitor all

                    WAP-to-wired-network communications with an intrusion
                    detection system (IDS).

              10.  Require all transmissions between wireless clients and WAPs to be
                    encrypted; in other words, require a VPN link.





                             Often, adding layers of data encryption (WPA2 and IPSec

                  VPN) and other forms of filtering to a wireless link can reduce the

                  effective throughput by as much as 80 percent. In addition, greater
                  distances from the base station and the presence of interference
                  will reduce the effective throughput even further.




               Wireless Attacks

               Wireless communication is a quickly expanding field of technologies
               for networking, connectivity, communication, and data exchange.
               Literally thousands of protocols, standards, and techniques can be

               labeled as wireless. These include cell phones, Bluetooth, cordless
               phones, and wireless networking. As wireless technologies continue to
               proliferate, your organization’s security must go beyond locking down
               its local network. Security should be an end-to-end solution that
               addresses all forms, methods, and techniques of communication.

               Wireless networking has become common on both corporate and

               home networks. Properly managing wireless networking for reliable
               access as well as security isn’t always a straightforward proposition.
               Even with wireless security present, wireless attacks can still occur.
               There is an ever-increasing variety of attacks against networks, and
               many of these work against both wired and wireless environments. A
               few focus on wireless networks alone. This section examines various

               wireless security issues.


               War Driving
   795   796   797   798   799   800   801   802   803   804   805