Professional Documents
Culture Documents
Controlled Access To Wireless Networks
Controlled Access To Wireless Networks
Controlled Access to
Wireless Networks
Whitepaper
www.seqrite.com
Table of Contents Abstract
1 Abstract 01 Wireless network was an evolutionary move but every path has its puddle. Many enterprises are
2 Introduction 02 sporting flexible work environment for employees by providing them with portable devices (such as
3 Threats to wireless security 02 laptops) to access enterprise resources remotely.
3.1 Rogue Access Point 02 A wired network requires physical access to the device but a wireless network can be targeted and
3.2 Man-in-the-Middle Attacks 03 exploited from a distance. This makes sensitive data of an enterprise more vulnerable to the outside
3.3 Unmanaged use of wireless outside the enterprise 04 world and data security over a wireless network an increasingly pressing need. Hence an enterprise
3.4 Evil Twins 04 needs to control the access to wireless network from an employee’s device.
4 Secure Systems using Controlled Access to Wireless Network 05
This white paper lists different attacks that can possibly exploit enterprise resource via wireless
5 Conclusion 06
network and how controlled wireless network access lessens the possibility of these attacks.
Rogue
Legitimate Access Point Threats to Wireless Security
access point
3.1 Rogue Access Point
Let’s start with ‘What is an Access Point?’. An Access Point (AP) is a network hardware which acts
Legitimate as an interface between wireless network and wired network. When you connect to a wireless
access point network AP it will then ultimately connect you to the desired wired network.
Rogue means dishonest. So as the name suggests, in this attack a dishonest access point is setup
by the attacker within the range of an existing wireless network. Then this false access point acts
as a legitimate access point and users are fooled into connecting to this access point. Once the
connection with this access point is established user’s entire data will be rerouted to the attacker’s
network.
This type of attack is short lived but can cause major havoc if an attacker gets some amount of
physical access. For instance if attacker gains access to physical port of a company network and
hooks his access point (rogue access point) to this port, then it will be very easy for the attacker to
User 2 capture all the data transfer occurring via this port.
User 1 But if the wireless LAN being targeted is used only for Internet access; then attacker does not need
Controlled Area physical access to the network for exploiting it for an extended period of time.
Unauthorized
Access Point
Seqrite is backed by Quick Heal’s cutting-edge expertise of producing cybersecurity solutions for over
two decades. Our products help secure the networks used by millions of customers in more than 80
countries.
Request Demo
Certifications
Quick Heal Technologies Limited
TOP PRODUCT
Corporate office: Marvel Edge, Office No. 7010 C & D, 7th Floor,
17
/20