Wireless and wired security: one and the same

By
Page 2 of 2  |  Single page

Additionally, misconfigured access points can act as a bridge to the wired network, sending multicast, wired data and credentials into the air, where intruders and hackers on the wireless side of the network can intercept them.

Wireless and wired security: one and the same

This is merely an overview of the threats inherent to wireless networks, but it indicates how complex wireless management can be. The only way for organisations to truly fortify their wireless networks is to take a "layered" approach to security, which mirrors that of wired networks:

  1. Locking down the WLAN's perimeter (both access points and wireless-enabled stations)
  2. Securing communication across all wireless networks (authentication, encryption and VPNs)
  3. 24/7 real-time monitoring of network traffic

Ideally, organisations should implement a solution that monitors both wired and wireless networks for a real-time view of traffic across the entire infrastructure so that network administrators can quickly troubleshoot problems. Like a video camera that monitors all activity in a secure building, 24 hours a day, a critical layer of continuous wireless monitoring is essential to identify rogue devices, detect intruders, terminate and locate unauthorised connections, and enforce security policies.

It is estimated that there are tens of millions of new Wi-Fi devices shipped each year, which means the number of points for a potential breach is constantly increasing. The implications of such transient networks aren't only restricted to the network edge, but can directly affect the wired backbone of the enterprise. No business should ignore the risk of a security breach that can impact reputation, intellectual property and regulated information.

Ronald van Kleunen is principal solutions consultant of wireless security, Asia Pacific, Motorola AirDefense Security Solutions, Enterprise Mobility Business.

 

Previous Page 1 2 Single page
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?