How the security implications of wireless networks affect our computers

Source: Internet
Author: User
Tags range

In cities, people open wireless terminals at any time, always found around the existence of a variety of types of wireless networks, for people to access the network to provide more convenient choice. However, there is a benefit must have a disadvantage, WLAN wireless network is no exception, the wide range of applications brought about by the information leakage risk can not be overlooked, that wireless network security risks to our computer what impact? The following Crystal Shield Small series to give you say:

First, ubiquitous wireless networks have broken our definition of traditional physical network boundaries, extending the network to the next door or even farther afield, and network sniffing and attacks seem to be getting easier relative to wired networks.

Second, because WLAN's own protocol mechanism at the beginning of design did not consider too much security, make it more vulnerable to attack, reduce the threshold of hacker intrusion.

Third, due to WLAN work in the ISM Open band, and a variety of WLAN equipment everywhere, people can easily build a wireless network, or even a remote transmission (several kilometers to dozens of kilometers) of the wireless bridge system, these privately built network system, unregulated, very likely to become information leakage of the black hole.

These risks are a thorny issue for those enterprises which have strict confidentiality requirements. How can you effectively manage the risks of wireless networks and make wireless network signals manageable? The first time in the domestic introduction of the Wireless LAN Intrusion Prevention system (WLAN IPS) gives the most appropriate answer.

WLAN IPs is a professional security system for wireless LAN Security detection and protection. Qiming star WLAN IPs can detect wireless cracking in real time, wireless fishing, rogue AP and so on hundreds of WLAN-based wireless network security events, and can be set according to user demand for wireless access or blocking strategies, providing 7x24 uninterrupted wireless network security protection functions to avoid wireless information leakage, to resolve the wireless network security risks. In addition, through the integration with the traditional IPs deployment, more can provide wired, wireless unified security protection, the formation of integrated network intrusion prevention solutions, to provide users with a full range of security. In foreign countries, the use of WLAN IPs has been more common, for example, in the United States, the relevant laws and regulations in the Department of Defense, Military, hospital, payment card industry and other network environment, must deploy WLAN IPs equipment or regular use of such devices for wireless security checks to eliminate potential wireless risk.

A unit in the confidentiality of the requirements are very strict, in tens of thousands of square meters of the factory, any hidden dangers of information leakage need to be excluded, the network has also implemented physical isolation and other security management measures, at the same time, in accordance with the provisions of confidentiality, production areas are not allowed to use wireless equipment.

However, due to the lack of necessary regulatory means, network managers can only use laptops for testing, although often found in some wireless networks, but it is difficult to determine whether someone is using these wireless networks, and these wireless networks are from outside the factory, or internal personnel built privately; Even if it is confirmed that internal personnel use the wireless network, it is difficult to troubleshoot and timely and effective control measures.

Back to the column page: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/

Therefore, when the introduction of the wireless local area network intrusion defense system (WLAN IPS) can carry out effective wireless network security risk control, the unit immediately requested the Product trial. The network manager of the unit deploys the trial equipment to an important workshop located in the center of production area, and after the equipment is put into operation, the wireless equipment in the surrounding thousands of square meters and the properties of the equipment, the connection information are quickly detected and displayed by WLAN IPs, and These wireless networks and equipment, the existence of security risks and the attacks are also reported as a timely warning to the Central management Center.

By observing the wireless devices and connections within the area, managers quickly discovered that a few suspicious brands of smartphones were connecting to an external wireless network, and that, based on the wireless terminal details provided by WLAN IPs, managers quickly found the workers, shut down the wireless connections and criticized the service.

Subsequently, managers noticed that the WLAN IPs hint area there is a high signal strength wireless AP, its SSID also has a certain randomness, and not using a high security encryption, it is likely that someone in the factory has been erected in the wireless network. As a result, the management after the investigation, found located in a technician desk under the wireless AP. Originally, the technician himself has a tablet computer, in order to facilitate the use of the access to a home AP, also forgot to dismantle, the wireless AP has been working, become an important hidden information leakage. The unit has been seriously addressed to the technician and its supervisor.

After the exclusion of potential wireless information leaks, network managers on the site of the wireless network has been very clear, when the star Chen technical staff suggested that he can set some wireless network security strategy, the use of these strategies, WLAN IPs can real-time, automatic, accurate blocking those illegal wireless terminals, To prevent the occurrence of the leakage incident.

The wireless network security policy is set up in a very simple way, similar to the firewall policy setting, which allows you to specify properties such as wireless networks, wireless terminals, wireless events, and set up logical relationships between them. In addition to a few necessary isolated wireless networks, wireless networks and wireless terminals in other factory-wide areas are set to be banned. After the setting is successful, the manager used a laptop to test the site and found that the wireless network, which had successfully connected to the WLAN IPs, had not been able to connect, and after testing all of the wireless networks, the serious-looking network manager smiled. The risk of WLAN leaks, which has plagued him for a long time, has finally been resolved.

After a few weeks of trial, the unit network managers think that qiming star WLAN IPs wireless network security control effect is very obvious, and decided to purchase, in the factory fully deployed to protect the entire plant's wireless network security, to avoid wireless information leakage.

At present, the formal procurement of equipment has been deployed, running in good condition, the unit in charge of information security leaders happily said: "Before always worried about invisible, touch wireless network will leak, now through the deployment of Qiming star WLAN IPS, wireless network for us is to see, can manage, no longer fear." ”

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.