SlideShare a Scribd company logo
1 of 10
Download to read offline
AIRTIGHT NETWORKS           WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise
A White Paper by AirTight Networks, Inc.


339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043
www.airtightnetworks.com




                                                             © 2008 AirTight Networks, Inc. All rights reserved.
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Executive summary

                                        The instant and obvious benefits of WiFi have made WLANs a big success
                                        in public, private, and enterprise sectors. Unfortunately, the adoption of
                                        correct security measures for WLANs is lagging far behind the fast pace
                                        at which these networks are being deployed. The presence of WiFi in
                                        most laptops and handhelds, the simplicity of independently installing
                                        WiFi networks, and the ease of exploiting wireless vulnerabilities have
                                        together escalated the risks manifold. Even organizations that do not
                                        own a WLAN are equally at risk.

                                        A wireless intrusion prevention system (WIPS) is the prevalent approach for mitigating
                                        wireless security threats. However, businesses cannot always justify the cost of buying
                                        a full-fledged WIPS solution. Some consider the limited WIPS functionality in-built in
                                        certain WLAN infrastructure as sufficient. For others that do not own a WLAN, a common
                                        misconception is simply having a “no WiFi” policy makes their corporate network immune
                                        to wireless threats. A fundamental problem underlying this confusion is that businesses
                                        are unable to assess their security posture and fail to comprehend the severity of associ-
                                        ated risks. In many cases, they complacently fall back to a “no action” plan leaving them
                                        exposed.

                                        This whitepaper revisits the wireless security space, debunks common myths, and presents
                                        wireless vulnerability management (WVM) as a proactive strategy to wireless security.
                                        WVM is a two-prong approach. Conducting wireless security audits to assess the security
                                        posture of a network is the first and necessary step towards managing wireless vulner-
                                        abilities. Following, a graded approach can be taken to remediate the vulnerabilities,
                                        pass regulatory compliance, and secure critical assets.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                          2
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Wireless broadband access is becoming a lifestyle. WiFi networks are everywhere: from
                                        offices, warehouses, retails stores, and schools to hotel lobbies, airports, coffee shops,
                                        and on the street. WiFi is easy to install and convenient to use. The plug-and-play nature
                                        of the technology and the unguided nature of the wireless medium that are central to
                                        the benefits of WiFi are also the primary reasons that make WLANs inherently vulnerable
                                        to a security breach.

                                        The simplicity allows users to buy inexpensive off-the-shelf equipment and install it inde-
                                        pendently, without bothering about the ramifications of their action. Most users do not
                                        comprehend the associated risks. The invisible radio waves used for transmission make
                                        the traditional “harden-the-network-perimeter” security approach obsolete. Radio waves
                                        often spill beyond the confines of a building. Malicious hackers in the airspace can use
                                        these waves to enter your network and steal sensitive data. This means that even a single
                                        wireless device on your premises, let alone a wireless LAN, can open a wireless backdoor
                                        to your corporate backbone network that is otherwise protected by non-wireless firewalls
                                        and intrusion detection systems.

                                        Wireless security is commonly misunderstood as security for wireless networks. In fact,
                                        wireless security today is an inevitable piece of the overall network and data security
                                        puzzle. So, the right question to ask is not ‘Is my wireless network secure?’ but ‘Is my
                                        network wireless-secure?’.

                                        Escalating Risks from Wireless Vulnerabilities
                                        Businesses are increasingly relying on WiFi, but without appropriate security measures,
                                        they are prime candidates for a security breakdown. The recent wireless security survey
                                        (published in June 2007) conducted in areas of New York, London, and Paris by RSA, The
                                        Security Division of EMC, reported the following:

                                           Exponential increase (up to 160%) in the number of WiFi access points (APs) in one year.

                                           Over 20% APs in all three cities were unprotected giving easy access to unauthorized users.

                                           Up to 30% APs had factory-default settings, which grossly violate best practices norms
                                           of operating WLANs and are highly vulnerable.

                                           Up to 76% APs were identified as hotspots that provide Internet access in public places;
                                           some hotspots are potentially fake (aka honeypots) and used for identity theft and
                                           stealing sensitive data.

                                           The survey concluded: “Continued education for both businesses and consumers
                                           regarding [wireless] security considerations, best practices, and the potential for
                                           corporate disruption, is essential.”




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                           3
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Surveys of this nature, commonly termed as “wardriving,” can be conducted with standard
                                        equipment, e.g., laptop with WiFi. Most wireless vulnerabilities can be exposed and
                                        exploited with minimal expertise, using off-the-shelf hardware, and hacking tools freely
                                        available on the Internet.

                                        It cannot be stressed more that lapse in wireless security can have drastic repercussions:
                                        financial loss, privacy infringement, damage of reputation, thrashing of customer confi-
                                        dence, and litigations and Government regulatory actions. Here are just few examples:

                                           In January 2007, TJX Companies disclosed massive security breach (cost projected at
                                           one billion dollars over five years by Forrester Research). At least 45.7 million credit- and
                                           debit-card numbers and personal information such as social security numbers, driver’s
                                           license numbers, and military identification of 451,000 customers was stolen. The breach
                                           was initiated using the flawed WEP-encrypted WLAN at the Marshalls store near St. Paul,
                                           Minnesota in July 2005. [The Wall Street Journal Online, May 4, 2007]

                                           Political consultant Meridian Pacific Inc. was accused of illegally hacking into the South
                                           San Joaquin Irrigation District (SSJID)’s wireless network and accessing sensitive docu-
                                           ments. Investigators found the SSJID WLAN was unprotected and anyone could enter
                                           their network through wireless access without username and password.
                                           [Recordnet.com, September 30, 2005]

                                           Hackers, sitting in a parking lot outside Lowe’s store in Southfield, Michigan, entered
                                           into Lowe’s corporate network using an open WLAN. Hackers gained access to servers
                                           across 7 US states, planted credit card data sniffing software, and crashed the point of
                                           sale system. [Security Focus, November 12, 2003]

                                           GE Money in Finland reported €200,000 stolen in a security breach. GE Money data
                                           security manager and accomplices were found guilty of stealing account information
                                           and the money; they had used a neighboring unprotected WLAN to covertly enter the
                                           private network. [Techworld, August 22, 2005]

                                        Different Faces of Wireless Vulnerabilities
                                        Wireless vulnerabilities come in different shapes and sizes. They can be classified in the
                                        following three ways.

                                        Outside-in vs. Inside-out: The spillage of radio waves outside a premise makes the
                                        wireless LAN (WLAN) accessible to outsiders. This scenario opens up “outside-in” vulner-
                                        abilities—those that can be exploited by unauthorized users to enter your network.
                                        Another implication, even for organizations that do not own a WLAN, is that radio waves
                                        from an external WLAN can spill into your airspace making wireless access available to
                                        employees with WiFi gadgets. This opens up “inside-out” vulnerabilities as employees
                                        using such access violate corporate security policies, e.g., firewalls and URL filters.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                             4
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Employees may use external wireless access for downloading illegitimate content or
                                        for transferring sensitive company data over unprotected wireless links. Malicious hackers
                                        can advertise fake WLANs to lure users, eventually exploiting wireless as a backdoor to
                                        enter a company’s private network.

                                        Protocol vs. Implementation: Vulnerabilities can occur as a weakness in the wireless
                                        protocol, e.g., limitations of WEP encryption, flaws in the 802.11 (WiFi) standards. Attacks
                                        that exploit flaws in the standard are particularly difficult to detect unless the illegitimate
                                        device is identified. While the 802.11 standards (e.g., 802.11i and w) are continually evolving
                                        for better security, they address only a subset of flaws in legacy protocols. Besides, newer
                                        attacks are constantly being discovered putting WLAN security measures at risk of
                                        obsolescence. Vulnerabilities also arise from a flaw in the implementation, e.g., software
                                        driver of WiFi radio. Poor implementation of AP or client software or ways in which it is
                                        managed by the operating system can allow a hacker to crash or disable the device, or
                                        take control of the device and use it as a backdoor to enter the wired corporate network
                                        to which it is connected.

                                        AP vs. Client: Misconfigured APs and clients (e.g., WiFi laptops) are common targets of
                                        security attacks. The recent Café Latte attack is an example of exploiting a misconfigured
                                        client using WEP, even when it is not associated with an AP. Attacks such as MAC spoofing
                                        and denial-of-service (DoS) can be launched selectively on a client or an AP for potentially
                                        disrupting the entire WLAN.

                                        Common Myths about Wireless Security
                                        Understanding of wireless security is unfortunately marred by many myths. Plug-and-
                                        play wireless users tend to blindly follow diktats without confirming their veracity, in turn
                                        contributing to wireless malpractices galore. Myths about wireless security can be both
                                        dangerous and costly—giving a false sense of security to organizations while exposing
                                        their private network and data to outsiders. Here, we dispel the common myths about
                                        wireless security.

                                        Myth #1: My wireless LAN is safe because I have a firewall securing my wired corporate
                                        LAN from the Internet.
                                        Non-wireless security solutions such as firewall and intrusion detection systems operate
                                        at layer 3 (i.e., network layer) and above. A wireless LAN presents a potential entry point
                                        into your wired corporate LAN at layers 1 and 2 (i.e., physical and link layers), circumventing
                                        all wired security measures.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                           5
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Myth #2: I already got my wired corporate LAN scanned from an auditor, so I do not
                                        need to worry about wireless security threats.
                                        Non-wireless scanning tools are powerful in detecting anomalies and vulnerabilities on
                                        a wired network. But they fail to capture vulnerabilities at layers 1 and 2 of the wireless
                                        LAN. It is a good idea to periodically audit your network against wireless vulnerabilities.

                                        Myth #3: My company does not own a wireless LAN, so I do not need to worry about
                                        wireless security threats.
                                        Though an enterprise may not own a wireless LAN, today, it is almost impossible to
                                        remain isolated from the wireless presence. Employees using laptops may inadvertently
                                        access external WLANs exposing the inside-out wireless vulnerabilities. Employees may
                                        deploy a rogue AP or unauthorized, malicious users may connect wireless devices
                                        opening backdoors to your organization’s private backbone network and sensitive data.
                                        Hence, even if an enterprise does not officially deploy a WLAN, it must address the wireless
                                        security threat and ensure that a “no WiFi” policy is truly enforced on the premises.

                                        Myth #4: We use WEP to secure all our WiFi communication, so our over-the-air
                                        data is secure.
                                        The legacy Wired Equivalent Privacy (WEP) encryption gives a false sense of security. It is
                                        well-known that WEP is broken and can be compromised in minutes exposing over-the-
                                        air data. Using WEP is widely considered as a malpractice by wireless security experts.
                                        Organizations should replace WEP by more recent, stronger alternatives such as WPA2
                                        or at least adopt other remediation solutions that proactively protect WEP devices.

                                        Myth #5: We use WPAWPA2802.11i for all our WiFi communication, so our network
                                        is secure.
                                        As a response to the flaws in WEP, WiFi Protected Access (WPA) was proposed. It was
                                        upgraded to WPA2-the implementation of the IEEE 802.11i standard. WPA or WPA2, if used
                                        with pre-shared key (PSK) are still vulnerable to dictionary attacks that can crack the
                                        password. Further, simply using WPA/WPA2 does not secure your network. Vulnerabilities
                                        such as rogue APs, clients misassociating with external APs and ad-hoc networks that
                                        bypass your security policy control can still expose your data and network to unauthorized
                                        access. Denial-of-service attacks can also continue to disrupt your WLAN.

                                        Myth #6: LEAP enables effective WLAN security.
                                        The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary security
                                        solution developed by Cisco. The authentication mechanism in LEAP, based on the
                                        MS-CHAPv2 protocol, is known to be flawed. It can be exploited using a brute force
                                        dictionary attack, and has in fact been rated by the CVE standard as a highest severity
                                        vulnerability.


                                        © 2008 AirTight Networks, Inc. All rights reserved.                                           6
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Myth #7: MAC address filtering on wireless access points is effective in
                                        securing WLANs.
                                        Bypassing MAC filtering is easy. Freely available software tools can be used to sniff MAC
                                        addresses being used by devices in the vicinity. MAC spoofing is one of the easiest attacks
                                        to launch, and filtering MAC addresses does not provide any security for your wireless
                                        LAN. MAC filtering is not only ineffective, but it is cumbersome to maintain for a reasonable-
                                        sized wireless LAN.

                                        Myth #8: Turning off SSID broadcast is a step towards securing a WLAN.
                                        It is a common misconception that turning off SSID broadcast on a wireless AP will
                                        not allow unauthorized users to discover the AP. Freely available software tools exist
                                        that actively probe and discover APs that respond to these probes. Passive sniffing of
                                        wireless traffic can also allow hackers to discover wireless APs in the vicinity. Turning off
                                        SSID broadcast is not only ineffective, but it in fact leads to another severe vulnerability.
                                        Authorized clients that usually connect to enterprise APs, probe for the hidden SSID. A
                                        hacker can sniff this information and use it to launch a honeypot attack.

                                        Myth #9: Need for wireless security ends in my airspace.
                                        Managing wireless vulnerabilities is not limited to an organization’s premises. Wireless
                                        users carry their corporate laptops when they travel. If they connect to WLANs outside
                                        the premise, say in a coffee shop across the world, they are still at risk. Recent survey by
                                        AirTight Networks at several airports in the US and worldwide captured the elevated
                                        threats to wireless devices from viral SSIDs and ad-hoc networks. To carry wireless
                                        security on the road, wireless client security software—that enforces corporate security
                                        policies and manages how a wireless client behaves and connects—is essential.

                                        Myth #10: Need for wireless security is hyped.
                                        Non-wireless vulnerability assessment tools fail miserably to capture wireless vulner-
                                        abilities and hence tend to mislead users in believing that wireless vulnerabilities do not
                                        exist. Businesses can ignore wireless security at their own peril. The RSA survey is only
                                        one of the many published studies across industry and academia that show that wireless
                                        is everywhere and so are wireless threats. Recently, advisory firms such as Gartner, SANS,
                                        and Farpoint Group have repeatedly ranked wireless security as a top ten concern.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                             7
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        Managing Wireless Vulnerabilities
                                        Wireless vulnerability management is a continuous process of appraising a network’s
                                        wireless threat exposure followed by appropriate remediation. After taking steps to
                                        repair and close the holes in the network, the network should be scanned again for
                                        vulnerability assessment. This follow-up scan will complete the vulnerability manage-
                                        ment loop. Comparing the pre- and post-remediation reports will help confirm if the
                                        network threat exposure has been indeed reduced to an acceptable level.




                                            Figure 1. Wireless Vulnerability Management Lifecycle


                                        Airspace Risk Assessment: Know your environment
                                        Wireless security begins by first gaining visibility into the wireless presence (active wireless
                                        devices) in your airspace and assessing the potential risk it poses. The next measure is
                                        then to identify your authorized networks (SSIDs) and classify your authorized devices.
                                        This classification is a prerequisite to an accurate wireless vulnerability assessment.

                                        Wireless Vulnerability Assessment: Knocking on Your Wireless Backdoor
                                        Wireless intrusion detection and prevention is reactive: attacks are detected and dealt
                                        with after they occur. Wireless vulnerability assessment is proactive: instead of waiting for
                                        a malicious hacker to break into a network, the network is scanned for vulnerabilities before
                                        they can be exploited. In essence, it provides a third-party evaluation or a “hacker’s eye
                                        view” of a network’s exposure to wireless threats.




                                        © 2008 AirTight Networks, Inc. All rights reserved.                                            8
AIRTIGHT NETWORKS         WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                        In addition to protecting their assets, organizations are liable to protecting their consumers’
                                        sensitive data, e.g., credit card information in the retail sector, patient data in hospitals,
                                        protecting children in schools from getting exposed to illegal content, and personal
                                        identity information such as driver’s license and social security numbers. Depending on
                                        the segment they belong to, organizations are required to comply with legislative regu-
                                        lations such as PCI, SOX, HIPAA, GLBA, and DoD.

                                        An effective wireless vulnerability assessment solution should:

                                          Automatically scan for all known vulnerabilities enabling zero-day attack protection

                                          Accurately detect and locate existing and potential vulnerabilities without false positives

                                          Create an inventory of critical assets and unauthorized devices in the airspace

                                          Present the scan results in a concise, but informative report that classifies vulnerabilities,
                                          prioritizes them according to well-defined severity levels, summarizes the main findings,
                                          and recommends remedial actions

                                          Compare reports generated at different times

                                          Map wireless vulnerabilities in the context of the relevant regulatory compliance

                                        Wireless Vulnerability Remediation
                                        The logical next step after wireless vulnerability assessment is remediation of detected
                                        vulnerabilities. Given the different flavors of vulnerabilities, a one-size-fits-all remediation
                                        will not work. Here are different types of remediation methods broadly classified into two
                                        categories: Manual and Automatic.

                                        1. Configuration
                                          Wireless vulnerabilities begin with misconfigured devices. The least a network administrator
                                          must do is to ensure that operational settings of all authorized wireless devices follow the
                                          widely accepted best practices and compliance recommendations.

                                        2. Software patch
                                          When a software bug in a wireless driver is discovered, the vendor usually publishes a software
                                          patch to fix the bug. It is critical to keep your wireless software up-to-date. In addition,
                                          wireless security vendors may also provide software patches to APs and clients for protecting
                                          them against protocol flaws. Using these patches will raise the bar for potential hackers.
AIRTIGHT NETWORKS                        WHITE PAPER




Wireless Vulnerability Management:
What It Means for Your Enterprise




                                                               3. Wireless client security software
                                                                  A wireless security software installed on client devices can help organizations enforce
                                                                  wireless security policies on all authorized clients even when they are “on the road.” It can
                                                                  also play an important role in the overall wireless security by reporting anomalous activities
                                                                  in its vicinity.

                                                               4. Wireless security solution
                                                                  A wireless security solution provides automatic 24x7 monitoring and protection of wireless
                                                                  airspace. A good solution should:
                                                                  •	 Enforce	global	wireless	security	and	usage	policies,	e.g.,	regulatory	compliance,	and	
                                                                     corporate policies including “no WiFi”

                                                                  •	 Detect	anomalies	and	attacks

                                                                  •	 Locate	source	of	anomalous	activities

                                                                  •	 Isolate	source	of	anomalous	activities	and	prevent	an	attack

                                                               Remediation methods 1 and 2 can be classified as strictly “manual” solutions and
                                                               methods 3 and 4 can be classified as “automatic” solutions.

                                                               About AirTight Networks
                                                               AirTight Networks is the industry standard for wireless vulnerability management
                                                               and the only company that offers a flexible, end-to-end solution that gives customers
                                                               visibility into their wireless security posture and a choice in how they manage it. AirTight’s
                                                               SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS).
                                                               Its SpectraGuard Online service is the world’s first on demand wireless vulnerability
                                                               management service which provides a flexible approach to addressing wireless vulner-
                                                               abilities with no capital investment. AirTight’s patented technology delivers the key
                                                               elements of an effective WIPS to eliminate false alarms, block wireless threats immediately
                                                               and automatically and locate wireless devices and events with pinpoint precision. AirTight’s
                                                               customers include global retail, financial services, corporate, education and government
                                                               organizations. AirTight Networks is a privately held company based in Mountain View, CA.
                                                               For more information please visit www.airtightnetworks.com




Wireless Vulnerability Management
AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043
T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com
© 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and
AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are
properties of their respective owners. Specifications are subject to change without notice.

More Related Content

What's hot

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Aharon Aharon
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
WTHS
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
William Chipman
 
Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
Ivan Carmona
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
Dean Kay
 

What's hot (20)

WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Attacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network SecurityAttacks and Risks in Wireless Network Security
Attacks and Risks in Wireless Network Security
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Security Models in Cellular Wireless Networks
Security Models in Cellular Wireless NetworksSecurity Models in Cellular Wireless Networks
Security Models in Cellular Wireless Networks
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 
Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
 
IRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized UsersIRJET- Research Paper Firewall- Prevent Unauthorized Users
IRJET- Research Paper Firewall- Prevent Unauthorized Users
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance Trend Micro - Virtualization and Security Compliance
Trend Micro - Virtualization and Security Compliance
 
FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay FINAL PROJECT Dean Kay
FINAL PROJECT Dean Kay
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 

Viewers also liked

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Viewers also liked (9)

Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 

Similar to Wireless Vulnerability Management: What It Means for Your Enterprise

Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
Edie II
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
Lindsey Landolfi
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
thasnim1304
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wi-Fi Data Analysis based on Machine Learning
Wi-Fi Data Analysis based on Machine LearningWi-Fi Data Analysis based on Machine Learning
Wi-Fi Data Analysis based on Machine Learning
AIRCC Publishing Corporation
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domain
ijtsrd
 

Similar to Wireless Vulnerability Management: What It Means for Your Enterprise (20)

Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Wns rogues wp_1011_v3
Wns rogues wp_1011_v3Wns rogues wp_1011_v3
Wns rogues wp_1011_v3
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wi-Fi Data Analysis based on Machine Learning
Wi-Fi Data Analysis based on Machine LearningWi-Fi Data Analysis based on Machine Learning
Wi-Fi Data Analysis based on Machine Learning
 
A Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless DomainA Literature Survey on Security Management Policies used in Wireless Domain
A Literature Survey on Security Management Policies used in Wireless Domain
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 

More from AirTight Networks

Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
AirTight Networks
 

More from AirTight Networks (20)

Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
802.11n The Good, The Bad, and The Ugly: Will You Be Ready?
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Wireless Vulnerability Management: What It Means for Your Enterprise

  • 1. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved.
  • 2. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Executive summary The instant and obvious benefits of WiFi have made WLANs a big success in public, private, and enterprise sectors. Unfortunately, the adoption of correct security measures for WLANs is lagging far behind the fast pace at which these networks are being deployed. The presence of WiFi in most laptops and handhelds, the simplicity of independently installing WiFi networks, and the ease of exploiting wireless vulnerabilities have together escalated the risks manifold. Even organizations that do not own a WLAN are equally at risk. A wireless intrusion prevention system (WIPS) is the prevalent approach for mitigating wireless security threats. However, businesses cannot always justify the cost of buying a full-fledged WIPS solution. Some consider the limited WIPS functionality in-built in certain WLAN infrastructure as sufficient. For others that do not own a WLAN, a common misconception is simply having a “no WiFi” policy makes their corporate network immune to wireless threats. A fundamental problem underlying this confusion is that businesses are unable to assess their security posture and fail to comprehend the severity of associ- ated risks. In many cases, they complacently fall back to a “no action” plan leaving them exposed. This whitepaper revisits the wireless security space, debunks common myths, and presents wireless vulnerability management (WVM) as a proactive strategy to wireless security. WVM is a two-prong approach. Conducting wireless security audits to assess the security posture of a network is the first and necessary step towards managing wireless vulner- abilities. Following, a graded approach can be taken to remediate the vulnerabilities, pass regulatory compliance, and secure critical assets. © 2008 AirTight Networks, Inc. All rights reserved. 2
  • 3. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Wireless broadband access is becoming a lifestyle. WiFi networks are everywhere: from offices, warehouses, retails stores, and schools to hotel lobbies, airports, coffee shops, and on the street. WiFi is easy to install and convenient to use. The plug-and-play nature of the technology and the unguided nature of the wireless medium that are central to the benefits of WiFi are also the primary reasons that make WLANs inherently vulnerable to a security breach. The simplicity allows users to buy inexpensive off-the-shelf equipment and install it inde- pendently, without bothering about the ramifications of their action. Most users do not comprehend the associated risks. The invisible radio waves used for transmission make the traditional “harden-the-network-perimeter” security approach obsolete. Radio waves often spill beyond the confines of a building. Malicious hackers in the airspace can use these waves to enter your network and steal sensitive data. This means that even a single wireless device on your premises, let alone a wireless LAN, can open a wireless backdoor to your corporate backbone network that is otherwise protected by non-wireless firewalls and intrusion detection systems. Wireless security is commonly misunderstood as security for wireless networks. In fact, wireless security today is an inevitable piece of the overall network and data security puzzle. So, the right question to ask is not ‘Is my wireless network secure?’ but ‘Is my network wireless-secure?’. Escalating Risks from Wireless Vulnerabilities Businesses are increasingly relying on WiFi, but without appropriate security measures, they are prime candidates for a security breakdown. The recent wireless security survey (published in June 2007) conducted in areas of New York, London, and Paris by RSA, The Security Division of EMC, reported the following: Exponential increase (up to 160%) in the number of WiFi access points (APs) in one year. Over 20% APs in all three cities were unprotected giving easy access to unauthorized users. Up to 30% APs had factory-default settings, which grossly violate best practices norms of operating WLANs and are highly vulnerable. Up to 76% APs were identified as hotspots that provide Internet access in public places; some hotspots are potentially fake (aka honeypots) and used for identity theft and stealing sensitive data. The survey concluded: “Continued education for both businesses and consumers regarding [wireless] security considerations, best practices, and the potential for corporate disruption, is essential.” © 2008 AirTight Networks, Inc. All rights reserved. 3
  • 4. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Surveys of this nature, commonly termed as “wardriving,” can be conducted with standard equipment, e.g., laptop with WiFi. Most wireless vulnerabilities can be exposed and exploited with minimal expertise, using off-the-shelf hardware, and hacking tools freely available on the Internet. It cannot be stressed more that lapse in wireless security can have drastic repercussions: financial loss, privacy infringement, damage of reputation, thrashing of customer confi- dence, and litigations and Government regulatory actions. Here are just few examples: In January 2007, TJX Companies disclosed massive security breach (cost projected at one billion dollars over five years by Forrester Research). At least 45.7 million credit- and debit-card numbers and personal information such as social security numbers, driver’s license numbers, and military identification of 451,000 customers was stolen. The breach was initiated using the flawed WEP-encrypted WLAN at the Marshalls store near St. Paul, Minnesota in July 2005. [The Wall Street Journal Online, May 4, 2007] Political consultant Meridian Pacific Inc. was accused of illegally hacking into the South San Joaquin Irrigation District (SSJID)’s wireless network and accessing sensitive docu- ments. Investigators found the SSJID WLAN was unprotected and anyone could enter their network through wireless access without username and password. [Recordnet.com, September 30, 2005] Hackers, sitting in a parking lot outside Lowe’s store in Southfield, Michigan, entered into Lowe’s corporate network using an open WLAN. Hackers gained access to servers across 7 US states, planted credit card data sniffing software, and crashed the point of sale system. [Security Focus, November 12, 2003] GE Money in Finland reported €200,000 stolen in a security breach. GE Money data security manager and accomplices were found guilty of stealing account information and the money; they had used a neighboring unprotected WLAN to covertly enter the private network. [Techworld, August 22, 2005] Different Faces of Wireless Vulnerabilities Wireless vulnerabilities come in different shapes and sizes. They can be classified in the following three ways. Outside-in vs. Inside-out: The spillage of radio waves outside a premise makes the wireless LAN (WLAN) accessible to outsiders. This scenario opens up “outside-in” vulner- abilities—those that can be exploited by unauthorized users to enter your network. Another implication, even for organizations that do not own a WLAN, is that radio waves from an external WLAN can spill into your airspace making wireless access available to employees with WiFi gadgets. This opens up “inside-out” vulnerabilities as employees using such access violate corporate security policies, e.g., firewalls and URL filters. © 2008 AirTight Networks, Inc. All rights reserved. 4
  • 5. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Employees may use external wireless access for downloading illegitimate content or for transferring sensitive company data over unprotected wireless links. Malicious hackers can advertise fake WLANs to lure users, eventually exploiting wireless as a backdoor to enter a company’s private network. Protocol vs. Implementation: Vulnerabilities can occur as a weakness in the wireless protocol, e.g., limitations of WEP encryption, flaws in the 802.11 (WiFi) standards. Attacks that exploit flaws in the standard are particularly difficult to detect unless the illegitimate device is identified. While the 802.11 standards (e.g., 802.11i and w) are continually evolving for better security, they address only a subset of flaws in legacy protocols. Besides, newer attacks are constantly being discovered putting WLAN security measures at risk of obsolescence. Vulnerabilities also arise from a flaw in the implementation, e.g., software driver of WiFi radio. Poor implementation of AP or client software or ways in which it is managed by the operating system can allow a hacker to crash or disable the device, or take control of the device and use it as a backdoor to enter the wired corporate network to which it is connected. AP vs. Client: Misconfigured APs and clients (e.g., WiFi laptops) are common targets of security attacks. The recent Café Latte attack is an example of exploiting a misconfigured client using WEP, even when it is not associated with an AP. Attacks such as MAC spoofing and denial-of-service (DoS) can be launched selectively on a client or an AP for potentially disrupting the entire WLAN. Common Myths about Wireless Security Understanding of wireless security is unfortunately marred by many myths. Plug-and- play wireless users tend to blindly follow diktats without confirming their veracity, in turn contributing to wireless malpractices galore. Myths about wireless security can be both dangerous and costly—giving a false sense of security to organizations while exposing their private network and data to outsiders. Here, we dispel the common myths about wireless security. Myth #1: My wireless LAN is safe because I have a firewall securing my wired corporate LAN from the Internet. Non-wireless security solutions such as firewall and intrusion detection systems operate at layer 3 (i.e., network layer) and above. A wireless LAN presents a potential entry point into your wired corporate LAN at layers 1 and 2 (i.e., physical and link layers), circumventing all wired security measures. © 2008 AirTight Networks, Inc. All rights reserved. 5
  • 6. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Myth #2: I already got my wired corporate LAN scanned from an auditor, so I do not need to worry about wireless security threats. Non-wireless scanning tools are powerful in detecting anomalies and vulnerabilities on a wired network. But they fail to capture vulnerabilities at layers 1 and 2 of the wireless LAN. It is a good idea to periodically audit your network against wireless vulnerabilities. Myth #3: My company does not own a wireless LAN, so I do not need to worry about wireless security threats. Though an enterprise may not own a wireless LAN, today, it is almost impossible to remain isolated from the wireless presence. Employees using laptops may inadvertently access external WLANs exposing the inside-out wireless vulnerabilities. Employees may deploy a rogue AP or unauthorized, malicious users may connect wireless devices opening backdoors to your organization’s private backbone network and sensitive data. Hence, even if an enterprise does not officially deploy a WLAN, it must address the wireless security threat and ensure that a “no WiFi” policy is truly enforced on the premises. Myth #4: We use WEP to secure all our WiFi communication, so our over-the-air data is secure. The legacy Wired Equivalent Privacy (WEP) encryption gives a false sense of security. It is well-known that WEP is broken and can be compromised in minutes exposing over-the- air data. Using WEP is widely considered as a malpractice by wireless security experts. Organizations should replace WEP by more recent, stronger alternatives such as WPA2 or at least adopt other remediation solutions that proactively protect WEP devices. Myth #5: We use WPAWPA2802.11i for all our WiFi communication, so our network is secure. As a response to the flaws in WEP, WiFi Protected Access (WPA) was proposed. It was upgraded to WPA2-the implementation of the IEEE 802.11i standard. WPA or WPA2, if used with pre-shared key (PSK) are still vulnerable to dictionary attacks that can crack the password. Further, simply using WPA/WPA2 does not secure your network. Vulnerabilities such as rogue APs, clients misassociating with external APs and ad-hoc networks that bypass your security policy control can still expose your data and network to unauthorized access. Denial-of-service attacks can also continue to disrupt your WLAN. Myth #6: LEAP enables effective WLAN security. The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary security solution developed by Cisco. The authentication mechanism in LEAP, based on the MS-CHAPv2 protocol, is known to be flawed. It can be exploited using a brute force dictionary attack, and has in fact been rated by the CVE standard as a highest severity vulnerability. © 2008 AirTight Networks, Inc. All rights reserved. 6
  • 7. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Myth #7: MAC address filtering on wireless access points is effective in securing WLANs. Bypassing MAC filtering is easy. Freely available software tools can be used to sniff MAC addresses being used by devices in the vicinity. MAC spoofing is one of the easiest attacks to launch, and filtering MAC addresses does not provide any security for your wireless LAN. MAC filtering is not only ineffective, but it is cumbersome to maintain for a reasonable- sized wireless LAN. Myth #8: Turning off SSID broadcast is a step towards securing a WLAN. It is a common misconception that turning off SSID broadcast on a wireless AP will not allow unauthorized users to discover the AP. Freely available software tools exist that actively probe and discover APs that respond to these probes. Passive sniffing of wireless traffic can also allow hackers to discover wireless APs in the vicinity. Turning off SSID broadcast is not only ineffective, but it in fact leads to another severe vulnerability. Authorized clients that usually connect to enterprise APs, probe for the hidden SSID. A hacker can sniff this information and use it to launch a honeypot attack. Myth #9: Need for wireless security ends in my airspace. Managing wireless vulnerabilities is not limited to an organization’s premises. Wireless users carry their corporate laptops when they travel. If they connect to WLANs outside the premise, say in a coffee shop across the world, they are still at risk. Recent survey by AirTight Networks at several airports in the US and worldwide captured the elevated threats to wireless devices from viral SSIDs and ad-hoc networks. To carry wireless security on the road, wireless client security software—that enforces corporate security policies and manages how a wireless client behaves and connects—is essential. Myth #10: Need for wireless security is hyped. Non-wireless vulnerability assessment tools fail miserably to capture wireless vulner- abilities and hence tend to mislead users in believing that wireless vulnerabilities do not exist. Businesses can ignore wireless security at their own peril. The RSA survey is only one of the many published studies across industry and academia that show that wireless is everywhere and so are wireless threats. Recently, advisory firms such as Gartner, SANS, and Farpoint Group have repeatedly ranked wireless security as a top ten concern. © 2008 AirTight Networks, Inc. All rights reserved. 7
  • 8. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise Managing Wireless Vulnerabilities Wireless vulnerability management is a continuous process of appraising a network’s wireless threat exposure followed by appropriate remediation. After taking steps to repair and close the holes in the network, the network should be scanned again for vulnerability assessment. This follow-up scan will complete the vulnerability manage- ment loop. Comparing the pre- and post-remediation reports will help confirm if the network threat exposure has been indeed reduced to an acceptable level. Figure 1. Wireless Vulnerability Management Lifecycle Airspace Risk Assessment: Know your environment Wireless security begins by first gaining visibility into the wireless presence (active wireless devices) in your airspace and assessing the potential risk it poses. The next measure is then to identify your authorized networks (SSIDs) and classify your authorized devices. This classification is a prerequisite to an accurate wireless vulnerability assessment. Wireless Vulnerability Assessment: Knocking on Your Wireless Backdoor Wireless intrusion detection and prevention is reactive: attacks are detected and dealt with after they occur. Wireless vulnerability assessment is proactive: instead of waiting for a malicious hacker to break into a network, the network is scanned for vulnerabilities before they can be exploited. In essence, it provides a third-party evaluation or a “hacker’s eye view” of a network’s exposure to wireless threats. © 2008 AirTight Networks, Inc. All rights reserved. 8
  • 9. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise In addition to protecting their assets, organizations are liable to protecting their consumers’ sensitive data, e.g., credit card information in the retail sector, patient data in hospitals, protecting children in schools from getting exposed to illegal content, and personal identity information such as driver’s license and social security numbers. Depending on the segment they belong to, organizations are required to comply with legislative regu- lations such as PCI, SOX, HIPAA, GLBA, and DoD. An effective wireless vulnerability assessment solution should: Automatically scan for all known vulnerabilities enabling zero-day attack protection Accurately detect and locate existing and potential vulnerabilities without false positives Create an inventory of critical assets and unauthorized devices in the airspace Present the scan results in a concise, but informative report that classifies vulnerabilities, prioritizes them according to well-defined severity levels, summarizes the main findings, and recommends remedial actions Compare reports generated at different times Map wireless vulnerabilities in the context of the relevant regulatory compliance Wireless Vulnerability Remediation The logical next step after wireless vulnerability assessment is remediation of detected vulnerabilities. Given the different flavors of vulnerabilities, a one-size-fits-all remediation will not work. Here are different types of remediation methods broadly classified into two categories: Manual and Automatic. 1. Configuration Wireless vulnerabilities begin with misconfigured devices. The least a network administrator must do is to ensure that operational settings of all authorized wireless devices follow the widely accepted best practices and compliance recommendations. 2. Software patch When a software bug in a wireless driver is discovered, the vendor usually publishes a software patch to fix the bug. It is critical to keep your wireless software up-to-date. In addition, wireless security vendors may also provide software patches to APs and clients for protecting them against protocol flaws. Using these patches will raise the bar for potential hackers.
  • 10. AIRTIGHT NETWORKS WHITE PAPER Wireless Vulnerability Management: What It Means for Your Enterprise 3. Wireless client security software A wireless security software installed on client devices can help organizations enforce wireless security policies on all authorized clients even when they are “on the road.” It can also play an important role in the overall wireless security by reporting anomalous activities in its vicinity. 4. Wireless security solution A wireless security solution provides automatic 24x7 monitoring and protection of wireless airspace. A good solution should: • Enforce global wireless security and usage policies, e.g., regulatory compliance, and corporate policies including “no WiFi” • Detect anomalies and attacks • Locate source of anomalous activities • Isolate source of anomalous activities and prevent an attack Remediation methods 1 and 2 can be classified as strictly “manual” solutions and methods 3 and 4 can be classified as “automatic” solutions. About AirTight Networks AirTight Networks is the industry standard for wireless vulnerability management and the only company that offers a flexible, end-to-end solution that gives customers visibility into their wireless security posture and a choice in how they manage it. AirTight’s SpectraGuard Enterprise provides a robust wireless intrusion prevention system (WIPS). Its SpectraGuard Online service is the world’s first on demand wireless vulnerability management service which provides a flexible approach to addressing wireless vulner- abilities with no capital investment. AirTight’s patented technology delivers the key elements of an effective WIPS to eliminate false alarms, block wireless threats immediately and automatically and locate wireless devices and events with pinpoint precision. AirTight’s customers include global retail, financial services, corporate, education and government organizations. AirTight Networks is a privately held company based in Mountain View, CA. For more information please visit www.airtightnetworks.com Wireless Vulnerability Management AirTight Networks, Inc. 339 N. Bernardo Avenue #200, Mountain View, CA 94043 T +1.877.424.7844 T 650.961.1111 F 650.961.1169 www.airtightnetworks.com info@airtightnetworks.com © 2008 AirTight Networks, Inc. All rights reserved. AirTight Networks and the AirTight Networks logo are trademarks, and AirTight and SpectraGuard are registered trademarks of AirTight Networks, Inc. All other trademarks mentioned herein are properties of their respective owners. Specifications are subject to change without notice.