Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What will be the impact of security risks in wireless networks on our computers?

2025-02-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

In the city, when people turn on the wireless terminal at any time, they will always find that there are various types of wireless networks around them, which provides more convenient choices for people to access the network. However, there are advantages and disadvantages, and WLAN wireless network is no exception. The risk of information leakage caused by its wide range of applications can not be ignored. What impact will the security risks of wireless network have on our computers? Next, the editor of Crystal Shield will tell you something about it:

First of all, the ubiquitous wireless network breaks our definition of the traditional physical network boundary, extending the network to the next door or even farther away, network sniffing and * * seem to be easier than wired networks.

Secondly, WLAN's own protocol mechanism does not consider too much security at the beginning of its design, which makes it more vulnerable to * * and lowers the threshold of *.

Third, because WLAN works in the ISM open frequency band, and all kinds of WLAN devices are available everywhere, people can easily build a wireless network, or even a wireless bridge system that can be transmitted remotely (several kilometers to tens of kilometers). These privately built network systems, unregulated, are likely to become black holes for information leakage.

The above risks, for those enterprises and institutions with relatively strict confidentiality requirements, is undoubtedly a rather thorny problem. How can we effectively manage the risks brought by the wireless network and make the wireless network signals within the controllable range? The wireless local area network defense system (WLAN IPS), which is first launched by Qiming Star in China, gives the most appropriate answer.

WLAN IPS is a professional security system for wireless local area network security detection and protection. Qiming Star WLAN IPS can detect hundreds of WLAN-based wireless network security events in real time, such as wireless cracking, wireless fishing, rogue WLAN, and so on, and can set wireless access or blocking policies according to user needs, providing 7 × 24 uninterrupted wireless network security protection features to avoid wireless information leakage and resolve wireless network security risks. In addition, through integrated deployment with traditional IPS, you can provide unified wired and wireless security protection, form an integrated network defense solution, and provide users with a full range of security. In foreign countries, the use of WLAN IPS has been quite common. For example, in the United States, relevant laws and regulations clearly stipulate that WLAN IPS devices must be deployed or regularly used for wireless security checks in the network environment of the Ministry of Defense, the military, hospitals, payment card industry and so on, in order to eliminate potential wireless risks.

The secrecy requirements of a certain unit are very strict. In a factory area of tens of thousands of square meters, any hidden danger of information leakage needs to be eliminated, and the network has also implemented security management measures such as physical isolation. At the same time, according to secrecy regulations, wireless equipment is also not allowed in the production area.

However, due to the lack of necessary regulatory means, network managers can only use laptops for detection. Although some wireless networks are often found, it is difficult to determine whether anyone is using these wireless networks. And whether these wireless networks come from outside the factory area or are privately built by internal personnel. In addition, even if it is confirmed that insiders have illegally used the wireless network, it is difficult to investigate and take timely and effective control measures.

Therefore, when it was learned that the wireless local area network defense system (WLAN IPS) launched by Qiming Star could manage the wireless network security risks effectively, the company immediately asked for a trial of the product. The network managers of this unit deploy the trial equipment in an important workshop located in the center of the production area. After the equipment is powered on, the wireless devices within several thousand square meters around, as well as device properties, connection and other information are quickly detected and displayed by WLAN IPS. Moreover, the security risks and security risks faced by these wireless networks and devices are also reported to the central management center as an alarm.

By observing the wireless devices and connections in the area, managers quickly noticed that several suspicious brand smartphones were connected to the external wireless network. According to the wireless terminal details provided by WLAN IPS, the managers quickly found the workers, turned off the wireless connection, and criticized them.

Subsequently, the manager noticed that there was a wireless AP with high signal strength in the WLAN IPS prompt area, and its SSID also had certain arbitrariness, and did not use the encryption method with high security, which was probably a wireless network set up privately by someone in the factory area. As a result, the manager searched and found the wireless AP under the desk of a technician. It turned out that the technician had a tablet computer of his own. in order to make it easy to use, he connected to a home AP and forgot to dismantle it after using it. The wireless AP has been working all the time, becoming an important hidden danger of information leakage. The unit dealt with the technician and his supervisor seriously.

After eliminating the potential hidden danger of wireless information leakage, the network manager has a very clear understanding of the wireless network in the factory area. At this time, the Qiming Star technician suggested that he can set some wireless network security policies, and using these strategies, WLAN IPS can real-time, automatically, and accurately block those illegal wireless terminals and prevent the occurrence of leaks.

The setting way of wireless network security policy is very simple, similar to the policy setting of firewall, you can specify wireless network, wireless terminal, wireless event and other properties, and set the logical relationship between them. With the exception of several necessary isolated wireless networks, wireless networks and wireless terminals in other plant areas are set to be prohibited. After setting up successfully, the manager used a laptop to test in the factory area and found that within the range of several thousand square meters of WLAN IPS work, the wireless network that could be connected smoothly had indeed been unable to connect. After testing all the wireless networks one by one, the original serious-looking network manager smiled, and the risk of WLAN leakage that had been troubling him for a long time was finally resolved.

After several weeks of trial, the network management staff of the unit thought that the wireless network security control effect of Qimingxing WLAN IPS was very obvious, and decided to place an order for comprehensive deployment in the plant area to ensure the wireless network security of the entire plant area and avoid wireless information leakage.

At present, the officially purchased equipment has been deployed and is in good condition, and the leader in charge of information security in this unit said happily: "in the past, we always worried about the leakage of the invisible and untouchable wireless network, but now through the deployment of the WLAN IPS of Qiming Star, the wireless network is visible and affordable to us, and we no longer have to worry about it."

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report