|Like what you see? Get it in one document for easy printing!|
Use coupon code "certiguide" to save 20%!
|Test yourself better with 300 extra Security+ questions!|
|Get It Here!|
The building in which the wireless
network is operating can be used as a shield for itself, reducing the
potential for unauthorized access to the LAN. The downside could be
a negative impact on pagers and cellular phones. An additional plus
is this reduces your risk of a wireless denial of service attack.
Keep in mind that 802.11b operates at the same frequency of a microwave oven. Something as simple as disabling the safety interlock of a consumer microwave oven creates a DoS weapon with up to 1000 watts of 802.11b interference. A more determined black hat may invest in a heavy duty antenna, capable of handling up to a 300W248 input from the inner workings of a microwave antenna.
If you are lucky enough to be designing
for a new construction, consider metal studs and run a bare copper ground
wire from the studs to a grounding rod. Before installing dry wall attach
very thin layers of aluminum to the metal studs.
More often retrofitting an existing
site will be your task. Steps to attenuate the signal include metallic
window treatments and metallic paint on wall surfaces.
At minimum, use a laptop with a wireless
network card attached loaded with the vendors software to reveal
signal strength and perform both an interior and exterior walk
through. Document the authorized locations. This needs to be done
on a regular basis. Wireless LANs can be bought at the store and plugged
into a hub by users without the knowledge of the company. Gartner has
estimated that at least 20% of companies have rogue Wireless LAN installations249.
Et Tu, Microsoft?
The issue of rogue wireless LANs is so widespread Microsoft CEO Steve Ballmer recently took advantage of it as told to InfoWorld.250
"I was in a hotel in Sun Valley last week that was not wired," Ballmer recalls. "So I turned on my PC and XP tells me there is a wireless network available. So I connect to something called Mountaineer. "Well, I don't know what that is, but I VPN into Microsoft. It worked! I don't know whose broadband I used," he chuckles. "I didn't see it in Bill's room. I called him up and said, 'Hey, come over to my room.' So soon everyone is there and connecting to the Internet through my room."
Now suppose it wasnt Microsoft employees using the Mountaineer wireless LAN to tunnel into Microsoft. If this was a group who wished to cause the Redmond firm grief, they could have done so without worrying about covering their tracks since a search would go directly to the owner of Mountaineer. Oops.
|If you find CertiGuide.com useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider buying an inexpensive PDF equivalent of the CertiGuide to Security+ from StudyExam4Less.com. (Use coupon code "certiguide" by December 31, 2004 to save 20%!) Thanks for your support!|
Table Of Contents - Contact Us
CertiGuide for Security+ (http://www.CertiGuide.com/secplus/) on CertiGuide.com
Version 1.0 - Version Date: November 15, 2004
Adapted with permission from a work created by Tcat Houser et al.
CertiGuide.com Version © Copyright 2004 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.