A Wi-Fi plan should be robust enough to address security concerns and clean enough to keep legal risks at bay

 

 

Aren’t we all at some stage disgusted to see the mesh of those wires connected to our computers? Don’t we wish we could make it clutter-free by getting rid of at least some of the wires? Don’t we wish we could connect tothe Internet or access the printer without those wires, securely? 

Well, Wi-Fi lets users access the Internet and other network resources, without the hassles of plugging in the Ethernet cable. It offers them convenience of moving their machines around the office, without losing connection to the Internet or other network resources.

Installing a Wi-Fi LAN in the office initially helps you set up the network for a fraction of the cost, especially if your office does not have structured cabling. Wireless access to the Internet at airports, restaurants and coffee shops is all courtesy Wi-Fi.

However, like most good things in life, Wi-Fi comes with its share of drawbacks. These negatives appear in the form of security risks, which can be of various types. These could compromise your confidential data, lead to theft of bandwidth resources, amount to a legal action against your organisation and in some extreme cases even land you behind bars!

Considering all these risks, is the convenience of Wi-Fi worth it? Alternatively, can we protect ourselves and the organisation against these risks, and at the same time take advantage of the benefits Wi-Fi has to offer?

While there cannot be complete security, there are ways to mitigate, and to an extent, circumvent some of these risks. So how should an organisation go about taking advantage of the technology and at the same time, protect itself from the risks identified above?
It all starts with planning

Planning the strategic location to install the access points, the strength of these strategically placed access points, who in the organisation can and cannot use the Wi-Fi technology (including visitors), and the security levels of Wi-Fi such as authentication or encryption are all very important prior to even procuring the infrastructure.

Aspects such as thickness and material of the outer walls and ceilings, and those of the different cabins inside also play an important part in the planning process.

Why is all this so important?

Well, let’s say that you have installed an access point near a window, or maybe close by, which causes the signal to leak outside the office. A person with a laptop in the opposite building or maybe even a floor above or below your office is able to access the Internet using your facility. He is now going to 'steal' your bandwidth resource to access the Internet.
Not much harm done here, but what if this person now uses your Internet facility through Wi-Fi, to hack into another organisation? How would you ever be able to trace this person? Like it or not, legally, it’s your organisation that is going to get penalised. Of course, this intruder can also hack into your own network, thus compromising your organisation’s confidential data. And once again, how are you ever going to be able to trace him or her?

Securing the installation
Let us address some technical aspects of securing a Wi-Fi installation in your organisation. Start by using strong passwords, to prevent the likelihood of this being compromised through brute force attacks. Also, it’s strongly advisable to rename the default administrator user name. Disabling the SSID broadcast i.e. your network’s 'name' is a good idea and mitigates the risk of an attack.

Restricting access through MAC address filtering will not deter a hard-core hacker, as MAC address spoofing is not that great a deal, but a combination of disabling the SSID broadcast and restricting access through MAC address filtering, will deter most novice hackers or script kiddies from compromising your Wi-Fi facility. Although it’s not always possible to do so, especially in large organisations, it’s a good idea to switch off a Wi-Fi network when not in use.
Personally, I am very uncomfortable with DHCP and prefer using static IP addresses, as this definitely helps as an added layer of security, in spite of its slight inconvenience. Ensure that your router’s firewall is not disabled while on the other hand, firewall on all desktops and laptops is enabled.

Encryption scrambles messages sent over the air. Deploying encryption technologies such as WPA2 with EAP authentication, TKIP/RC4 or AES-CCMP encryption technology, is a must for large organisations and depending on the nature of the business, this is applicable to SMBs too. WEP encryption is outdated and should be avoided at all costs, as it can be compromised in a matter of minutes. Also, there is nothing stopping you from deploying a second layer of encryption, for added security.

Deploying a Remote Authentication Dial In User Service (RADIUS) server for authentication, authorisation and accountability should definitely not be overlooked by medium and large organisations.  This will ensure that the user is authenticated before being authorised to access the network and at the same time, a track is kept of usage in terms of time and data transferred.

The IT manager of an organisation must be aware that there exists a plethora of free downloadable software on the Internet for detecting presence of Wi-Fi devices and hacking Wi-Fi facilities or capturing and deciphering packets. The IT manager must also be aware of the laws relating to Wi-Fi and the consequences of a Wi-Fi system being compromised.

 

By Berjes Eric Shroff  – read on http://www.itnext.in

Marius Ion ANGEL HOT SOFT LLC (800) 316-7677