Comptia wants administrators of small office, home office (SOHO) networks to be able to secure those networks in ways that protect the data stored on them. A wireless network is not, and never will be, 100% secure.
Its always best practice to use wired, but if you have to use wireless then make sure its the most secure it can be. Use these tips to make improvements to the wireless security:
All radio frequency signals can be intercepted. To intercept 802.11 wireless traffic, all you need is a PC with an appropriate 802.11 card installed. Many networks will regularly broadcast their name (aka an SSID Broadcast) to announce their presence. Disable SSID broadcast immediately. Simple software on an attacker’s PC can capture the link traffic being broadcasted and decrypt the account and password information. You should change the SSID to keep it from being a value that many outsiders come to know. If you use the same SSID for years, then the number of individuals who have left the company or otherwise learned of its value will only increase. Changing the variable only adds one more level of security. One method of protecting the network that is often recommended is to turn off the SSID broadcast. The access point will still be there and can be accessed by those who know of it, but it prevents people who are looking at a list of available networks from finding it. Very weak form of security, but it does add another layer. Disable DHCP or use Static IP addresses a SOHO network is small enough that you can get by without using DHCP to automatically issue IP addresses to each host, so if you can disable DHCP, do it! The advantage of using Static IP Addresses is that you can make certain which host is associated with which IP address and then utilize filtering to limit network access to only those hosts. Use MAC address filtering MAC filtering is when you’re able to allow/block known machines from accessing your network based on their physical address. also known as network lock Static IP Addresses is a form of IP filtering. It should be used on SOHO networks to keep from automatically issuing addresses to hosts other than those you recognize and want on the network. Use a pre-authentication system, such as RADIUS. RADIUS (Remote Authentication Dial-In User Service) is a common centralized authentication system used for computer and network systems. Its commonly used nowadays for authentication of virtual private networks (VPNs), wireless systems, and any network system that requires a common centralized authentication system. RADIUS operates as a client-server protocol. RADIUS Server controls authentication, authorization, and accounting (AAA). RADIUS Client can be wireless access points, a VPN, or wired switches. The RADIUS client will then communicate with the RADIUS server via UDP/1812 for authentication and UDP/1813 for accounting. Turn down the signal strength to the bare minimum needed to support connectivity Consideration should be made to lower the radio power levels, since the wireless access point has better transmitting power than most mobile devices. From a security stand point, power levels should be adjusted so that they do not travel past the interior of the organization’s building. If this happens, then someone in the parking lot or adjacent building could attempt to infiltrate the wireless network. This is why you should reduce the radio power level controls that allow you to reduce the amount of output provided. Use the strongest security available on the wireless access point Wireless Security from weakest to strongest: Protocols & Setting Encryption Its important to remember that you should always enable encryption for any wireless network that you administer. You should always choose the strongest level of encryption you can work with. Open security is just that — open — with no passphrase or authentication protocol. Open security was originally how all wireless access points (WAPs) were shipped to the customer. It’s used now for mostly guest networks now. WEP (Wired Equivalent Privacy) Shared passphrases are used with Wired Equivalent Privacy (WEP). WEP provides 64 or 128-bit encryption via the shared passphrase This form of wireless security can be easily cracked with tools and is no longer considered secure. WPA (Wi-fi Protected Access) WPA was standardized by the Wi-Fi Alliance in ‘03 in direct response to the vulnerabilities in WEP (Wired Equivalent Privacy). Its a direct upgrade to WEP (WEP → WPA) WPA used 256-bit encryption, vs the 64-bit & 128-bit keys used in WEP. WPA operates in two modes for security Pre-shared Key (PSK), also called Personal Mode. PSK is the most common mode because it can be easily configured with a password/passphrase. Enterprise Mode, also called WPA-802.1x Requires a certificate server infrastructure Uses the 802.1x protocol, RADIUS, and EAP Extensible Authentication Protocol (EAP)—EAP allows WPA to synchronize keys with an external RADIUS server. The keys are updated periodically based on time or number of packets. Use EAP in larger, enterprise-like deployments where you have an existing RADIUS framework. Used only in corporate environments TKIP (Temporal Key Protocol) was the first encryption standard created. No longer considered secure! Uses WPS (wi-fi protected setup) to help consumers setup the wi-fi with ease. This tool is exploitable. WPA-2 (Wi-Fi Protected Access 2) Released in 2006, also known as 802.11i Currently the strongest wi-fi security there is AES (Advanced Encryption Standard), which is more secure than TKIP. WPS (Wi-fi Protected Setup) is still exploitable and should be turned off Seriously consider removing wireless access from your LAN Change the static security keys (password) every two to four weeks When new wireless protection schemes become available (and are reasonably priced), consider migrating to them. Limit the user accounts that can use wireless connectivity. Use remote access filters against client type, protocols used, time, date, user account, content, and so forth. Use IPsec tunnels over the wireless links.
When setting up a wireless network, you are extending a wired network to a wireless network. Therefore, you must consider how users will authenticate to the wireless network. Below are the following ways you can do just that. single-factor authentication is a weak form of authentication. It’s based on only one of the following factors: Setting a wireless network based on a pre-shared key or password limits you to a single authentication factor that is shared by everyone that accesses the wi-fi. Wi-Fi passwords must be shared because there’s only correct value of it. This creates a huge gaping hole in your wireless security. MFA (Multifactor Authentication) is desirable for a higher level of wireless security. MFA requires two or more single factor authentication methods to be used to secure the wireless network. A common multifactor authentication implementation is the use of the Extensible Authentication Protocol - Transport Layer Security (EAP-TLS) protocol. EAP-TLS requires a digital certificate be installed in the OS along with a matching password for the computer before a user can gain access to a wireless network. Digital Certificate + The Correct Password → MFA RADIUS (Remote Authentication Dial-In User Service) is a common centralized authentication for users and computer network systems. It’s commonly used nowadays for authentication of virtual private networks (VPNs), wireless systems, and any network system that requires a common centralized authentication system. RADIUS encrypts only the password in the access request packet RADIUS operates as a client-server protocol. RADIUS Server controls authentication, authorization, and accounting (AAA). RADIUS Client can be wireless access points, a VPN, or wired switches. The RADIUS client will then communicate with the RADIUS server via UDP/1812 for authentication and UDP/1813 for accounting. With RADIUS and SSO configured, users on the network can provide their user credentials one time when they initially connect to the wireless access point or another RADIUS client and are then automatically authenticated to all of the network's resources. TACACS+ (Terminal Access Controller Access Control Systems)+ Protocol developed by Cisco Mainly used for authentication of users on routers and switches to allow management access. Primarily used for device administration Also used to authenticate to users connecting to wireless access points via a centralized database. Separates authentication and authorization Encrypts the entire payload of the access-request packet Declining in popularity and being replaced by RADIUS