CERT mailing list archives
Cyber Security Tip ST05-003 -- Securing Wireless Networks
From: US-CERT Security Tips <security-tips () us-cert gov>
Date: Thu, 11 Mar 2010 11:32:26 -0500
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Cyber Security Tip ST05-003
Securing Wireless Networks
Wireless networks are becoming increasingly popular, but they introduce
additional security risks. If you have a wireless network, make sure to take
appropriate precautions to protect your information.
How do wireless networks work?
As the name suggests, wireless networks, sometimes called WiFi, allow you to
connect to the internet without relying on wires. If your home, office,
airport, or even local coffee shop has a wireless connection, you can access
the network from anywhere that is within that wireless area.
Wireless networks rely on radio waves rather than wires to connect computers
to the internet. A transmitter, known as a wireless access point or gateway,
is wired into an internet connection. This provides a "hotspot" that
transmits the connectivity over radio waves. Hotspots have identifying
information, including an item called an SSID (service set identifier), that
allow computers to locate them. Computers that have a wireless card and have
permission to access the wireless frequency can take advantage of the
network connection. Some computers may automatically identify open wireless
networks in a given area, while others may require that you locate and
manually enter information such as the SSID.
What security threats are associated with wireless networks?
Because wireless networks do not require a wire between a computer and the
internet connection, it is possible for attackers who are within range to
hijack or intercept an unprotected connection. A practice known as
wardriving involves individuals equipped with a computer, a wireless card,
and a GPS device driving through areas in search of wireless networks and
identifying the specific coordinates of a network location. This information
is then usually posted online. Some individuals who participate in or take
advantage of wardriving have malicious intent and could use this information
to hijack your home wireless network or intercept the connection between
your computer and a particular hotspot.
What can you do to minimize the risks to your wireless network?
* Change default passwords - Most network devices, including wireless
access points, are pre-configured with default administrator passwords
to simplify setup. These default passwords are easily found online, so
they don't provide any protection. Changing default passwords makes it
harder for attackers to take control of the device (see Choosing and
Protecting Passwords for more information).
* Restrict access - Only allow authorized users to access your network.
Each piece of hardware connected to a network has a MAC (media access
control) address. You can restrict or allow access to your network by
filtering MAC addresses. Consult your user documentation to get specific
information about enabling these features. There are also several
technologies available that require wireless users to authenticate
before accessing the network.
* Encrypt the data on your network - WEP (Wired Equivalent Privacy) and
WPA (Wi-Fi Protected Access) both encrypt information on wireless
devices. However, WEP has a number of security issues that make it less
effective than WPA, so you should specifically look for gear that
supports encryption via WPA. Encrypting the data would prevent anyone
who might be able to access your network from viewing your data (see
Understanding Encryption for more information).
* Protect your SSID - To avoid outsiders easily accessing your network,
avoid publicizing your SSID. Consult your user documentation to see if
you can change the default SSID to make it more difficult to guess.
* Install a firewall - While it is a good security practice to install a
firewall on your network, you should also install a firewall directly on
your wireless devices (a host-based firewall). Attackers who can
directly tap into your wireless network may be able to circumvent your
network firewallâa host-based firewall will add a layer of protection to
the data on your computer (see Understanding Firewalls for more
information).
* Maintain anti-virus software - You can reduce the damage attackers may
be able to inflict on your network and wireless computer by installing
anti-virus software and keeping your virus definitions up to date (see
Understanding Anti-Virus Software for more information). Many of these
programs also have additional features that may protect against or
detect spyware and Trojan horses (see Recognizing and Avoiding Spyware
and Why is Cyber Security a Problem? for more information).
_________________________________________________________________
Authors: Mindi McDowell, Allen Householder, Matt Lytle
_________________________________________________________________
Produced 2005 by US-CERT, a government organization.
Note: This tip was previously published and is being
re-distributed to increase awareness.
Terms of use
http://www.us-cert.gov/legal.html
This document can also be found at
http://www.us-cert.gov/cas/tips/ST05-003.html
For instructions on subscribing to or unsubscribing from this mailing
list, visit
http://www.us-cert.gov/cas/signup.html.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iQEVAwUBS5kahj6pPKYJORa3AQKXwgf9GUS93AvBKRdEl+S3ELgKN1moKP6spOvs
iphU2Mq0KD3m9oDSJvCty26PP6zkHewKiW358f/PeZSr/Dp22j+zPL2YCmObu2Iv
fBbElw57ekahANyhEnoTYY98y7GymiCF4gxjaR8V3hd+WvRdsGKMsMUAgkhFS3UQ
0SUHErGAxpNUVGaAAKn7Fu8z3zV+j3JxwW6K7JDAQXBPBM3WoPcu2QCdkFOGOapO
cXlSYuRTD5nEwHDmQHm9mdxoUbdkiLtm3fVQD9+wn+Unwow4L5TjXtn0B5NWsjiy
5iDCAj59jiF3FsjuDL5GviLsfVsCAOXIhUkcprTTztsfI4Qk8JOIgA==
=7k5Y
-----END PGP SIGNATURE-----
Current thread:
- Cyber Security Tip ST05-003 -- Securing Wireless Networks US-CERT Security Tips (Mar 11)
