Warchalking and Other Wireless Worries
by Mike Small - VP eTrust Solutions for Computer Associates - Thursday, 3 April 2003.
The critical WLAN security issue relates to the placement of firewalls. Firewalls are used to prevent outsiders from gaining direct access into the enterprise Local Area Network. Hence it is assumed that it is safe to connect business critical servers and applications directly to the LAN. If a WLAN is connected directly to these business critical systems then it is possible to bypass the firewall by gaining access to the WLAN. Therefore it is essential to separate out WLANs and to connect them into the enterprise via a firewall. It is also advisable to strengthen the access controls on your business critical servers to provide added protection if the firewall is breached.

The cheap and easy availability of wireless equipment poses an insidious threat by making it possible for individuals with an organization to purchase and connect the wireless access points directly onto the corporate LAN thus compromising your security. Unicenter from Computer Associates provides technology that is able to automatically discover the existence of WLAN access points and can be used to detect unauthorised additions to the corporate LAN.

Computer Associates are exhibiting at Infosecurity Europe, Europe's largest and most important information security event. Now in its 8th year, the show features Europe's most comprehensive FREE education programme, and over 200 exhibitors at the Grand Hall at Olympia from 29th April - 1st May 2003.



Infosecurity Europe is Europe's largest and most important information security event. Now in its 8th year, the show features Europe's most comprehensive FREE education programme, and over 200 exhibitors at the Grand Hall at Olympia from 29th April - 1st May 2003. www.infosec.co.uk

Spotlight

eBook: Cybersecurity for Dummies

Posted on 16 December 2014.  |  APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, Dec 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //