文档介绍:Wireless Security and Monitoring for the work
Raymond Turner
Version GIAC GSEC Practical Assignment
August 21, 2003
Abstract
Marketing trends estimate that by the end of 2006, 21 million homes will have
implemented a Local work (LAN), and of those 21 million homes 65%
will use wireless solutions. [1] The rapidly decreasing cost for wireless devices
and the proliferation of wireless solutions provided by the major Service
Providers seems to clearly support these growth estimates.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Home wireless users and security professionals the world over are conceptually
trying to solve similar problems. They both need to find a way to provide a secure
working environment. There are two distinct approaches to this security
dilemma, security prevention, and security detection. An example of security
prevention would be a firewall device that restricts specific traffic or ports to or
from specific hosts. Although this provides protection against unauthorized traffic,
it has no means for determining if an attack is being attempted via an authorized
port. An example of security detection would be an IDS (Intrusion Detection
System) device that contains a signature to identify a specific attack via
authorized or unauthorized ports. [2] Security professionals often have the
technology and resources to develop security solutions based on prevention,
detection, or bination of the two. However, home wireless users do not
have the luxury of evaluating their security approach since the guidelines and
wireless devices marketed to the home user demographic have an overwhelming
dependency on preventative mechanisms. The first part of this document will
briefly review the basic home access point security mechanisms, and their
weaknesses. The second part will cover the implementation of a script to detect,
identify, and provide notification of users on a home w