Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 17 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
17
Dung lượng
313,19 KB
Nội dung
Wireless Security Contents Wireless Overview Wireless Security Risks Enhance Wireless Security Wireless diagram for finance organization I Wireless Overview More convenience than wired LAN Easy to connect, easy to share High Transport Speed 802.11ac standard can archive maximum 1,69 Gbit/s Most technology devices support WLAN (802.11a/b/g/n/ac): computer, phone, tablet, camera, printer, television, memory stick,… Municipal wireless network: some cities have coverage wireless such as Bangkok, Singapore, Ha long, Hoi an, Da nang, Hue II Wireless security risk Weak encryption WEP MIM - Man in the middle Easy bridge to wired LAN Rouge AP, evil twin,… Untrusted providers: Firmware, Embedded wireless chip on Housewares such as clothes iron, water heater,… III Enhance Wireless Security Create a Wireless Security Policy Secure the WLAN Protect Your Company from Outside Threats Security Awareness Training Create a Wireless Security Policy Acceptable use policy E-mail and communications activities Antivirus policy Identity policy Password policy Encryption policy Remote access policy Secure the WLAN Use strong encryption: WPA, WPA2 Change the default SSID, default administrator account/ password Use VLANs or MAC address control lists Disable SSID broadcast Guest access SSID AP Isolation Secure management ports Secure communications Physical secure Access points Limit Wireless range Turn off Wireless when not use Regularly changing encryption keys Protect Your Company from Outside Threats 802.1X authentication: RADIUS Assign Static IP Network Firewall and personal firewall software VPN: Virtual Private Network NAC: Network Access Control Wireless IPS: Prevent unauthorized, rogue AP, evil twin and other wireless threats Wireless Security Endpoints: BYOD Wireless Management System Logging Wireless Security Awareness Training Train users for using wireless securely Understand Wireless Security Policy and follow the policy Do Not Auto-Connect to Open Wi-Fi Networks 10 IV Wireless diagram for finance organization Requirements: Wireless used for customers and VIP employees, especially for HO and meeting rooms Highest security, prevent any wireless threats 11 Wireless diagram for finance organization Diagram 12 Wireless diagram for finance organization Diagram 13 Comparison Method Diagram 1: Advantage Design Diagram 1: Disadvantage Diagram 2: Advantage Equip Firewall, private Internet line for Branches No need to equip private Internet line for Branches Diagram 2: Disadvantage Performance Fast Internet access, low delay Slow Internet access, high delay, can effect WAN connection Security Secure Internal LAN, Internet access cannot go inside Passthough WAN Infrastructure, hard to control security Availability Keep access Internet as if WAN line lost Cannot access Internet if WAN line lost Operation Hard operation as must control separate Internet line of branches Easy to control because of central Internet management at HO 14 Which diagram is the best for your company? It depends on what you need If Wireless is deployed for several branches, diagram should be the best If Wireless is deployed for huge branches, diagram should be considered 15 Wireless Solution Providers Airtight Cisco Aruba Ruckus Juniper Meraki HP 16 References http:// www.cisco.com/web/solutions/smb/need_to/five_w ays_to_improve_your_wireless_security.html http:// compnetworking.about.com/od/wirelesssecurity/tp/ wifisecurity.htm 17 Questions and Answers Please contact: minhtoai@yahoo.com THANK YOU! ...2 Contents Wireless Overview Wireless Security Risks Enhance Wireless Security Wireless diagram for finance organization I Wireless Overview More convenience... Access Control Wireless IPS: Prevent unauthorized, rogue AP, evil twin and other wireless threats Wireless Security Endpoints: BYOD Wireless Management System Logging Wireless Security Awareness... Embedded wireless chip on Housewares such as clothes iron, water heater,… III Enhance Wireless Security Create a Wireless Security Policy Secure the WLAN Protect Your Company from Outside Threats Security