Advertisment

Worry Number One

author-image
VoicenData Bureau
New Update

Gaining a better understanding of WLAN security elements and employing best

practices can go a long way in enabling enterprises to reap the benefits of

wireless networking

Advertisment

Many of us

while thinking of a network visualize a closet of routers and switches with

flickering lights and fed by bundles of wires. In the last decade the wired

network has become the norm for businesses large and small; indeed, it's a

primary tool to achieve increased business productivity. These wires are akin to

a company's nervous system, carrying vital information to those who need it.

But even as companies

have grown more dependent on networks, modern business imperatives-such as

staying close to customers, providing flexible work environments, outsourcing,

and working with leaner staffs-have forced employees to look for alternatives

to wired network. Fortunately, wireless local-area networks (LANs) provide the

link between wired networks and mobile workers. This means a big boost to

employee productivity. As people move around throughout the course of a workday,

they can continue to send and receive e-mail and other communications and access

company information instead of waiting until they return to their workstations.

Advertisment

According to

AMI-Partners, by 2004, 45% of US businesses with 100 to 999 employees and 16% of

businesses with fewer than 100 employees had implemented WLANs. This trend is

echoed by Synergy Research Group too, which states that the wireless LAN market

is expected to reach nearly $3.4 bn by the end of 2005 and growing to 78% by

2009.

With wireless fast

becoming ubiquitous, having the power to transform the way a company operates,

companies big and small are reaping benefits of this revolution. As per a Yankee

Group survey, more than 20 mn SMB employees in the US are mobile workers,

representing more than half of all mobile workers in the US!

The Real World Threat



For many of us seeing is believing, but this emerging business tool can't

be seen with the human eye. Therefore when it comes to securing a wireless

network, out of sight should definitely not mean out of mind!

Advertisment

Indeed, security is

the biggest concerns to the adoption of wireless LANs. And it's not just a

big-company worry. When it comes to wireless networking, security is still the

number one concern for companies across all sizes.

Gaining a better

understanding of wireless LAN security elements and employing some best

practices can go a long way toward enabling enterprises to reap the benefits of

wireless networking.

Many wireless networks

are not properly secured or-even worse-are completely unsecured.

Fortunately, both user knowledge about security and the solutions offered by

technology vendors are improving. Today's wireless networks feature

comprehensive security capabilities and when these networks are properly

protected, companies can confidently take advantage of the benefits they offer.

Advertisment

Security Elements

Security

Solutions

There are three solutions available for securing wireless

LAN encryption and authentication basis the type of wireless LAN being

accessed and the level of data encryption required. These are Wi-Fi

Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2) and Virtual

private networking (VPN).

  • WPA and WPA2: WPA and WPA2 are standards-based

    security certifications from the Wi-Fi Alliance for enterprise, SMB,

    and small office/home office wireless LANs that provide mutual

    authentication to verify individual users and advanced encryption. WPA

    provides enterprise-class encryption and WPA2, the next generation of

    Wi-Fi security, supports government-grade encryption. WPA or WPA2 are

    recommended for enterprise and SMB wireless LAN deployments as they

    provide secure access control, strong data encryption, and protect the

    network from passive and active attacks. 

  • VPN: VPN provides effective security for users

    wirelessly accessing the network while on the road or away from the

    office. With VPN, users create a secure "tunnel" between two

    or more points on a network using encryption, even if the encrypted

    data is transmitted over unsecured networks such as the public

    Internet. Home-based teleworkers with dial-up or broadband connections

    can also use VPN.

Since most wireless access points come from the factory in 'open

access', so that all security features are turned off, enterprises need to

ensure that they turn these features on.

Advertisment

Three actions can help

to secure a wireless network: protecting data, while it's being transmitted

through encryption; discouraging unauthorized users through authentication; and

preventing unofficial connections through the elimination of rogue access

points.

Authentication:



Enterprises need to ensure that individuals who use the wireless network are

authorized to do so. Unique logins and passwords are the basis of

authentication, but additional tools can make authentication more secure and

reliable. The best authentication is per-user, per session mutual authentication

between the user and the authentication source.

Rogue Access Points: A

well-meaning employee who enjoys a wireless network at home might want to enjoy

the same freedom at work. He or she might purchase a cheap access point and plug

it into a network jack without asking permission. These are known as rogue

access points, and the majority of these are installed by employees-not

malicious intruders. Even company-sanctioned access points, when configured

improperly, can be security risks.

Advertisment

Encryption:

To make

sure that data can't be read, and to protect data from being altered as it's

transmitted between an access point and a wireless device, enterprises need to

use encryption. In a basic sense, encryption is like secret code: It translates

the data into gibberish that only the intended recipient understands. Encryption

requires that both the sender and receiver have a key to decode the transmitted

data. The most secure encryption uses very complicated keys, or algorithms, that

change regularly to protect data.

Wireless Security Policy

and Network Management



Having set the security processes in place, an enterprise needs to ensure

that its employees comply with the security policies set by the administrator.

Different security settings can be set for different users or groups of users

based on their needs and functions. This allows enterprises to cost effectively

use a single access point to support multiple user groups with different

security settings and security requirements- all while keeping the network

secure and protected.

It is also important to consider wireless network

security in the context of overall network security and network

management. A common management system increases efficiency for network

administrators
Advertisment

It is also important

to consider wireless network security in the context of overall network security

and network management. A common management system increases efficiency for

network administrators. Wireless LAN security even when integrated with overall

network management works only if it's turned on and used consistently across the

entire wireless LAN. That's why user policies are also an important part of good

security practices.

The challenge is to

devise a wireless LAN user policy that's simple enough for people to abide by,

yet secure enough to protect the network. Today, that's an easier balance to

strike because WPA and WPA2 are built into Wi-Fi certified access points and

client devices.

An enterprises

wireless LAN security policy should also cover when and how employees can use

public hot spots, the use of personal devices on the company's wireless

network, the forbidding of rogue devices, and a strong password policy.

In an era in where

instant access to information is a common expectation, network connectivity must

be available wherever it's needed-indoors, outdoors, or in vehicles.

Organizations of all sizes and in a wide range of industries are implementing

wireless LANs to provide this access. The ultimate goal of all enterprises is to

create a secure wireless 'cloud' over the entire community changing the way

people work, live, learn and play.

 

Advertisment