OpenSource For You

Protecting FOSS systems

-

Along with the monitoring techniques­I additional security measures are essential. cor small networksI changing the dHIaXOW SasswRUd and SS,D RI WKH AP Ls a PXsW. 0RdHUn routers are equipped with a feature to disable the broadcasti­ng RI SS,D, wKLFK sKRXOd EH WXUnHd Rn WR HnsXUH WKaW SassLYH snLIfing aWWaFNs aUH WKwaUWHd WR sRPH HxWHnW. PHULRdLFaO­Oy FKangLng SS,Ds Ls KLgKOy UHFRPPHndH­d, WKRXgK LW Fan EH a tough task for a large number of wireless Ams. qo protect a iinux server farm hosted in a data-centreI the wireless signal strength of Ams should be adjusted in such a way that it should be adequate for client nodes to connect and transfer data seamlessly­I but at the same time it should not cross physical building boundaries­I whereby it can be detected by a ‘drive-by’ attacker.

rsing WmAO security instead of Wbm is recommende­d. BesidesI the shared key of WmA security should be long and complex enough to stop directory brute-force attacks. cor large corporatio­nsI the iayer-T wireless security software should be installed on client nodes as well as AmsI to further strengthen the encryption process. cor clpp systemsI XsLng an ;.509 FHUWLfiFaW­H Rn HLWKHU Hnd RI WKH wLUHOHss communicat­ion can help achieve cheaper yet effective sHFXULWy. 0RsW IaPRXs flaYRXUs, sXFK as DHELan and 8EXnWX, support WmAO security with trimmings such as AbpI qhfm and /(AP. CRnfigXULn­g WKRsH, aORng wLWK 0AC addUHss fiOWHULng, and HnaEOLng fiUHwaOO IHaWXUHs Fan SURWHFW a sHULRXs sHUYHU IaUP, yHW OHW LW HnMRy WKH EHnHfiWs RI wLUHOHss nHWwRUNs.

Wireless attacks areI unfortunat­elyI easy to carry out and dLIfiFXOW WR dHWHFW. 0RdHUn daWa FHnWUHs aOORw WKH SUHsHnFH RI wireless networks connected to the product server farmsI thus requiring the implementa­tion of security measures. While there is no single solution to protect wireless networksI an appropriat­e combinatio­n of the techniques mentioned above can achieve adequate security. Wireless monitoring audits are an important activity that needs to be done by network administra­tors at regular intervals.

 ??  ??

Newspapers in English

Newspapers from India