896 KB | 3 files | DOC, PDF
The security of each WLAN is heavily dependent on how well each component — including client devices, access points and wireless switches — is secured throughout the WLAN lifecycle.
A wireless local area network (WLAN) is a group of wireless networking devices within a limited geographic area, such as an office building, that exchange data through radio communications. The most widely implemented WLAN technologies are based on the IEEE 802.11 standard and its amendments. The fundamental components of an IEEE 802.11 WLAN (hereafter referred to as a “WLAN” in this publication) are client devices, such as laptops and smartphones and access points (APs), which logically connect client devices with a distribution system, typically the organization’s wired network infrastructure. Some WLANs also use wireless switches, which act as intermediaries between APs and the distribution system.
The security of each WLAN is heavily dependent on how well each WLAN component — including client devices, APs and wireless switches — is secured throughout the WLAN lifecycle, from initial WLAN design and deployment through ongoing maintenance and monitoring. Unfortunately, WLANs are typically less secure than their wired counterparts for several reasons, including the ease of access to the WLAN and the weak security configurations often used for WLANs (to favor convenience over security). The purpose of this publication is to help organizations improve their WLAN security by providing recommendations for WLAN security configuration and monitoring. This publication supplements other NIST publications by consolidating and strengthening their key recommendations.
Organizations should implement the following guidelines to improve the security of their WLANs.
Included in this ZIP file are:
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ... More >>
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious URL intercepts, and the continuing rapid development of security. ... More >>
This document contains the technical specifications to interface with the smart card to retrieve and use the PIV identity credentials. ... More >>