19
• Wireless Intrusion Prevention System https://store.theartofservice.com/the-wireless-intrusion- prevention-system-toolkit.html

Wireless Intrusion Prevention System

Embed Size (px)

Citation preview

Page 1: Wireless Intrusion Prevention System

• Wireless Intrusion Prevention System

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 2: Wireless Intrusion Prevention System

Payment Card Industry Data Security Standard - Compliance and wireless LANs

1 In July 2009, the Payment Card Industry Security Standards Council published wireless guidelines for PCI

DSS recommending the use of wireless intrusion prevention system

(WIPS) to automate wireless scanning for large organizations. Wireless guidelines clearly define

how wireless security applies to PCI DSS 1.2 compliance.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 3: Wireless Intrusion Prevention System

Payment Card Industry Data Security Standard - Wireless intrusion prevention system (WIPS) implementations

1 Wireless intrusion prevention systems are a possible option for compliance with some PCI DSS

requirements, and can be implemented in either an internally

hosted or externally hosted software as a service(SaaS) model.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 4: Wireless Intrusion Prevention System

Intrusion prevention system - Classifications

1 Wireless intrusion prevention systems (WIPS): monitor a wireless

network for suspicious traffic by analyzing wireless networking

protocols.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 5: Wireless Intrusion Prevention System

RateBasedIPS - Classifications

1 # 'Wireless intrusion prevention systems (WIPS)': monitor a wireless

network for suspicious traffic by analyzing wireless networking

protocols.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 6: Wireless Intrusion Prevention System

PCI DSS - Compliance and wireless LANs

1 In July 2009, the Payment Card Industry Security Standards Council published wireless guidelines for PCI

DSS recommending the use of wireless intrusion prevention system

(WIPS) to automate wireless scanning for large organizations. Wireless guidelines clearly define

how wireless security applies to PCI DSS 1.2 compliance.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 7: Wireless Intrusion Prevention System

Information Security Operations Center - Technology

1 SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability

assessment systems; governance, risk and compliance (GRC) systems; web site assessment and

monitoring systems, application and database scanners; penetration testing tools; intrusion

detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and denial of service monitoring; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM)

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 8: Wireless Intrusion Prevention System

Rogue access point

1 To prevent the installation of rogue access points, organizations can

install wireless intrusion prevention systems to monitor the radio

spectrum for unauthorized access points.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 9: Wireless Intrusion Prevention System

Rogue access point

1 Presence of a large number of wireless access points can be sensed in airspace

of a typical enterprise facility. These include managed access points in the

secure network plus access points in the neighborhood. A wireless intrusion

prevention system facilitates the job of auditing these access points on a

continuous basis to learn whether there are any rogue access points among them.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 10: Wireless Intrusion Prevention System

Rogue access point

1 False positive (crying wolf) occurs when the wireless intrusion prevention system detects an access point not actually

connected to the secure network as wired rogue. Frequent false positives result in

wastage of administrative bandwidth spent in chasing them. Possibility of false positives

also creates hindrance to enabling automated blocking of wired rogues due to the fear of blocking friendly neighborhood

access point.https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 11: Wireless Intrusion Prevention System

Rogue access point

1 False negative occurs when the wireless intrusion prevention system

fails to detect an access point actually connected to the secure

network as wired rogue. False negatives result in security holes.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 12: Wireless Intrusion Prevention System

Wireless Intrusion Detection System

1 In computing, a 'wireless intrusion prevention system' (WIPS)

is a computer network|network device that monitors the radio spectrum for the presence of

unauthorized Wireless access point|access points (intrusion detection),

and can automatically take countermeasures (intrusion

prevention).https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 13: Wireless Intrusion Prevention System

Wireless security

1 Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion

Detection Systems (WIDS) are commonly used to enforce wireless

security policies.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 14: Wireless Intrusion Prevention System

Wireless security - The mobility advantage

1 Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion

Detection Systems (WIDS) are commonly used to enforce wireless

security policies.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 15: Wireless Intrusion Prevention System

Wireless security - Wireless intrusion prevention concepts

1 * For closed networks (like home users and organizations) the most common way is to

configure access restrictions in the Wireless access point|access points. Those

restrictions may include encryption and checks on MAC address. Another option is to disable ESSID broadcasting, making the

access point difficult for outsiders to detect. Wireless Intrusion Prevention Systems can be used to provide wireless LAN security in

this network model.https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 16: Wireless Intrusion Prevention System

Wireless security - A wireless intrusion prevention system

1 A Wireless Intrusion Prevention System (WIPS) is a concept for the

most robust way to counteract wireless security

risks.[https://www.pcisecuritystandards.org PCI Security Standards

Council] However such WIPS does not exist as a ready designed

solution to implement as a software package

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 17: Wireless Intrusion Prevention System

Wireless security - RF shielding

1 For closed networks (like home users and organizations) the most common way is to configure access restrictions in the access

points. Those restrictions may include encryption and checks on MAC address.

Another option is to disable ESSID broadcasting, making the access point

difficult for outsiders to detect. Wireless Intrusion Prevention Systems can be used to provide wireless LAN security in this network

model.

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html

Page 18: Wireless Intrusion Prevention System

WIPS

1 * Wireless intrusion prevention system, a network device that

monitors the radio spectrum for the presence of unauthorized access

points

https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html