Services: Wireless Security Design & Audit
With equipment prices dropping rapidly, wireless networking technologies are quickly being adopted by organizations.
Ease of installation and uneducated claims of security by manufacturers have resulted in many wireless systems being
configured with inadequate security.
The default Wired Equivalent Privacy (WEP) encryption protocol bundled with the current generation of
802.11 wireless equipment is fundamentally flawed and can be broken given relatively little time and effort.
Attackers can gain access to wireless systems via weak keys, forcing & monitoring authentication by users, hijacking
sessions through signal manipulation, and more. Furthermore, many authentication systems have an over-reliance on
MAC address as an authentication factor as MAC addresses are easily forged.
Despite all of these attacks, security of wireless networks not difficult to achieve. The proper configuration of the standard
802.11 security settings can prevent casual drive-by attackers. Systems with higher security requirements can can use
IPSec VPN technology to leverage proven authentication and encryption standards or they can take advantage of some of the
layer 2 solutions coming on to the market.
While wireless can be secured, improperly configured wireless and rogue wireless can offer a backdoor into the heart of
your network. Magnitude CG offers the following wireless services performed by some of the leading wireless security
consultants in Canada:
- Wireless site surveys to detect improperly configured and rogue systems
- Wireless architecture design and review
- Wireless penetration testing
Risk Assessment
Internet Vulnerability Assessment
Network Penetration Testing
Security Policy, Process, and Procedure Review
Design and Implementation
Secure Remote Access Infrastructure
Intrusion Detection System (IDS)
Secure Wireless Networking
Privacy of Personal Information
Development of Privacy Policy
Privacy Policy Audit
Awareness and Education
Management and Staff Awareness
IT Staff Security Administration Training
[Back to Top]
|