MCSA/MCSE Self-Paced Training Kit (Exam 70-214): Implementing and Administering Security in a Microsoft Windows 2000 Network (Pro-Certification)

Chapter 10

Wireless Security

About This Chapter

The amazing usefulness of new wireless network devices has fueled their sudden and rapid widespread adoption. As with all sudden changes in the fabric of networks, the benefits of new technology often precede real security by a period of time. Wireless devices have created a new vector that allows hackers to attack private networks. Although these attacks are usually against targets of opportunity and perpetrated merely to gain Internet access, they also provide the means for malicious users to attach to your network without worrying about the physical security you employ.

Security standards for wireless protocols are still evolving, which is creating a moving target for vendors and users alike in their efforts to secure this new capability. The existing security standard for encryption in wireless devices, Wired Equivalent Privacy (WEP), is being replaced by the newer 802.1x port authentication protocol. Both technologies are discussed in detail in this chapter.

Make sure you know how to secure a wireless access point by using Wired Equivalency Protocol.

Before You Begin

To accomplish the exercises in this chapter, you'll need relatively expensive hardware. If you don't have this hardware, you should still read through the exercises to learn how wireless devices are configured for security.

To follow the lessons in this chapter, you must have

To complete the lessons in this chapter exactly as written, you will need

Категории