The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Apr 2017 |
| Last Sign in: | 103 Weeks Ago, 2 Days Ago |
| Questions Answered: | 4870 |
| Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
NETW360 Week 6 iLab
Evaluating Security-Related WLAN Problems
In this lab, three scenarios are presented as examples of how WLAN security is addressed from different aspects: signal spillage, security standards, and rogue access points. Students are expected to fully understand each scenario, correctly identify the problem(s), and sufficiently justify their recommendations.
Scenario I: Signal Spillage
Signal spillage refers to the reach of Wi-Fi signals that is beyond the perimeter of an intended coverage area. Signals spilling outside the perimeter could be received and potentially be interpreted by outsiders. Given the reciprocal nature of antennas, a high-gain directional antenna can also be used to “amplify” weak Wi-Fi signals on the edge of the perimeter. Although the signal coverage area and physical boundary of a location may not be matched perfectly, signal spillage should be limited to reduce security risks.
Refer to the site survey diagram below. The Wi-Fi signal coverage area overlays with the second-floor physical layout of a campus building. The coverage area is color-coded with the descending signal strength from green, light green, yellow, to orange.
Scenario II: WLAN Security Standards
In addition to securing the perimeter of a network, encrypting the information itself has always been an important component of the security paradigm. This works well for data applications on a WLAN, as you will realize after evaluating Scenario II.
On a Voice over Wi-Fi (VoWiFi) network, however, encryption could pose a negative impact, such as choppy voice and echo problems, on delay-sensitive voice traffic. This is mainly due to 1) the extra encryption/decryption latency and 2) the overhead to Wi-Fi frames (e.g., extra 8 bytes from the WEP/RC4 encryption, extra 20 bytes from the WPA/RC4 encryption, and extra 16 bytes from the WPA2/AES encryption). Encryption, when being applied to real-time traffic, needs to be carefully considered.
Assume that the “Monitor” WLAN as shown below is assigned to a sales department. On a daily basis, sales data, including the credit card/check payment details, are transmitted on the network.
Scenario III: Rogue Access Points
Many wireless attacks, for example, man-in-the-middle and Denial-of-Service (DoS), start with a rogue access point. Enterprise WLAN controllers typically have the built-in capability of identifying and even quarantining access points that are not under its management. At times, a WLAN professional is also expected to physically locate and remove the rogue device.
The process of locating a rogue device requires a WLAN tool that measures the received signal strength from the targeted device. An external directional antenna, as compared to the typical omni-directional antennas, could speed up the process by zeroing in the direction of the targeted device.
Refer to the outcome of a recent wireless network sweep as shown below. As part of the security policy, all SSIDs used on this office network should start with “NETW”.