Information Technology Security. Advice from Experts

All the vulnerabilities that exist in a conventional wired LAN apply to wireless technologies (Karygiannis & Owens, 2002). Managers must prepare to remedy the WLAN vulnerabilities ” weaknesses in the configuration, implementation, design or management of a network or system ” with greater vigilance . Wireless networks present unique challenges when trying to mitigate threats ” anything that can disrupt the proper functioning of a network or system. The wireless devices bring to the table more problems because of their mobile nature. They move from network to network, gaining connection to the Internet and returning to the corporate WLAN with the possibility of carrying all sorts of malicious code. In a sense, mobile users should be thought of as a malicious code carrier and immediately quarantined in the demilitarized zone until they receive proper scanning to remove all know malware (malicious software). Users can inadvertently carry malware and infect the corporate LAN if they have not taken the proper precautions .

Figure 5: 802.11b Wireless Security

The NIST Special Publication 800-48 identifies some of the most prevalent threats and vulnerabilities to wireless devices. They are organized to illustrate which information assurance principle is violated when not properly mitigated.

Confidentiality violations occur if:

Integrity compromises occur if:

Availability is reduced if:

As WLANs become widespread, the need of business for a more robust security solution is required. Recent demonstrations of the vulnerability of Wired Equivalent Privacy (WEP) encryption make it clear that WEP protection alone is inadequate. The security features in WEP do not offer a high level of assurance. Fluhrer, Mantin and Shamir (2001) describe a passive cipher-text only attack on the RC4 stream cipher used in WEP. The authors stated, Note that we have not attempted to attack an actual WEP connection, and hence do not claim that WEP is actually vulnerable to this attack. Later, Stubblefield, Ioannidis and Rubin (2001) successfully implemented an attack, proving the complete vulnerability of WEP.

There is no need to fret about the design flaws identified in WEP. As a security service, WEP does what it was designed to do. As the name states, you get a level of privacy and security equivalent to that of wired LAN users. There were no guarantees and at the time the standard was published there may not have been anyone demanding guaranteed security features. For the WLAN, IEEE defined WEP to perform the following three functions:

Most of the complaints with WLAN security can be attributed to flaws in the design of the technology or specification. Weaknesses in the design are difficult to fix once the product is purchased. All technologies are susceptible to have a design flaw. To overcome the design weakness, WLAN managers should take extra care to properly configure, implement and managed the network. It is impossible to completely identify all possible vulnerabilities when a product is purchased and before it is added to the network. However, once purchased there is unlimited time to ˜tweak the configuration or implementation with strong management practices. The next section discusses the different types of countermeasures available to mitigate some of the known vulnerabilities.

The best countermeasures involve management, implementation and configuration (MIC) activities to mitigate vulnerabilities in the WLAN. Management countermeasures should be applied based on a well-crafted security policy. The policy should be based on management s vision and give a framework for managing the WLAN. Managers then execute the vision by the way they implement controls and configure settings on the network.

Категории