Upload
natalie-hamilton
View
214
Download
0
Embed Size (px)
Citation preview
• Wireless Intrusion Prevention System
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Payment Card Industry Data Security Standard - Compliance and wireless LANs
1 In July 2009, the Payment Card Industry Security Standards Council published wireless guidelines for PCI
DSS recommending the use of wireless intrusion prevention system
(WIPS) to automate wireless scanning for large organizations. Wireless guidelines clearly define
how wireless security applies to PCI DSS 1.2 compliance.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Payment Card Industry Data Security Standard - Wireless intrusion prevention system (WIPS) implementations
1 Wireless intrusion prevention systems are a possible option for compliance with some PCI DSS
requirements, and can be implemented in either an internally
hosted or externally hosted software as a service(SaaS) model.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Intrusion prevention system - Classifications
1 Wireless intrusion prevention systems (WIPS): monitor a wireless
network for suspicious traffic by analyzing wireless networking
protocols.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
RateBasedIPS - Classifications
1 # 'Wireless intrusion prevention systems (WIPS)': monitor a wireless
network for suspicious traffic by analyzing wireless networking
protocols.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
PCI DSS - Compliance and wireless LANs
1 In July 2009, the Payment Card Industry Security Standards Council published wireless guidelines for PCI
DSS recommending the use of wireless intrusion prevention system
(WIPS) to automate wireless scanning for large organizations. Wireless guidelines clearly define
how wireless security applies to PCI DSS 1.2 compliance.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Information Security Operations Center - Technology
1 SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability
assessment systems; governance, risk and compliance (GRC) systems; web site assessment and
monitoring systems, application and database scanners; penetration testing tools; intrusion
detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and denial of service monitoring; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM)
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Rogue access point
1 To prevent the installation of rogue access points, organizations can
install wireless intrusion prevention systems to monitor the radio
spectrum for unauthorized access points.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Rogue access point
1 Presence of a large number of wireless access points can be sensed in airspace
of a typical enterprise facility. These include managed access points in the
secure network plus access points in the neighborhood. A wireless intrusion
prevention system facilitates the job of auditing these access points on a
continuous basis to learn whether there are any rogue access points among them.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Rogue access point
1 False positive (crying wolf) occurs when the wireless intrusion prevention system detects an access point not actually
connected to the secure network as wired rogue. Frequent false positives result in
wastage of administrative bandwidth spent in chasing them. Possibility of false positives
also creates hindrance to enabling automated blocking of wired rogues due to the fear of blocking friendly neighborhood
access point.https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Rogue access point
1 False negative occurs when the wireless intrusion prevention system
fails to detect an access point actually connected to the secure
network as wired rogue. False negatives result in security holes.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless Intrusion Detection System
1 In computing, a 'wireless intrusion prevention system' (WIPS)
is a computer network|network device that monitors the radio spectrum for the presence of
unauthorized Wireless access point|access points (intrusion detection),
and can automatically take countermeasures (intrusion
prevention).https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless security
1 Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion
Detection Systems (WIDS) are commonly used to enforce wireless
security policies.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless security - The mobility advantage
1 Wireless Intrusion Prevention Systems (WIPS) or Wireless Intrusion
Detection Systems (WIDS) are commonly used to enforce wireless
security policies.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless security - Wireless intrusion prevention concepts
1 * For closed networks (like home users and organizations) the most common way is to
configure access restrictions in the Wireless access point|access points. Those
restrictions may include encryption and checks on MAC address. Another option is to disable ESSID broadcasting, making the
access point difficult for outsiders to detect. Wireless Intrusion Prevention Systems can be used to provide wireless LAN security in
this network model.https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless security - A wireless intrusion prevention system
1 A Wireless Intrusion Prevention System (WIPS) is a concept for the
most robust way to counteract wireless security
risks.[https://www.pcisecuritystandards.org PCI Security Standards
Council] However such WIPS does not exist as a ready designed
solution to implement as a software package
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
Wireless security - RF shielding
1 For closed networks (like home users and organizations) the most common way is to configure access restrictions in the access
points. Those restrictions may include encryption and checks on MAC address.
Another option is to disable ESSID broadcasting, making the access point
difficult for outsiders to detect. Wireless Intrusion Prevention Systems can be used to provide wireless LAN security in this network
model.
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
WIPS
1 * Wireless intrusion prevention system, a network device that
monitors the radio spectrum for the presence of unauthorized access
points
https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
For More Information, Visit:
• https://store.theartofservice.com/the-wireless-intrusion-prevention-system-toolkit.html
The Art of Servicehttps://store.theartofservice.com