Home Repair (alt.home.repair) For all homeowners and DIYers with many experienced tradesmen. Solve your toughest home fix-it problems.

Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
Posted to alt.home.repair
external usenet poster
 
Posts: 2
Default Solutions Fast Track - Monitoring and Intrusion

Dear Reader,

Designing for Detection
----------------------------
- Get the right equipment from the start. Make sure all of the
features you need, or will need, are available from the start.

- Know your environment. Identify potential physical barriers and
possible sources of interference.

- If possible, integrate security monitoring and intrusion detection
in your network from its inception.

Defensive Monitoring Considerations
------------------------------------------
- Define your wireless network boundaries, and monitor to know if
they’re being exceeded.

- Limit signal strength to contain your network.

- Make a list of all authorized wireless Access Points (APs) in your
environment. Knowing what’s there can help you

immediately identify rogue APs.

Intrusion Detection Strategies
-----------------------------------
- Watch for unauthorized traffic on your network. Odd traffic can be a
warning sign.

- Choose an intrusion detection software that best suits the needs of
your environment. Make sure it supports customizable

and updateable signatures.

- Keep your signature files current.Whether modifying them yourself,
or downloading updates from the manufacturer, make sure

this step isn’t forgotten.

Conducting Vulnerability Assessments
-------------------------------------------
- Use tools like NetStumbler and various client software to measure
the strength of your 802.11b signal.

- Identify weaknesses in your wireless and wired security
infrastructure.

- Use the findings to know where to fortify your defenses.

- Increase monitoring of potential trouble spots.

Incident Response and Handling
--------------------------------------
- If you already have a standard incident response policy, make
updates to it to reflect new potential wireless incidents.

- Great incident response policy templates can be found on the
Internet.

- While updating the policy for wireless activity, take the
opportunity to review the policy in its entirety, and make

changes where necessary to stay current. An out-of-date incident
response policy can be as damaging as not having one at all.

Conducting Site Surveys for Rogue Access Points
-------------------------------------------------------
- The threat is real, so be prepared. Have a notebook computer handy
to use specifically for scanning networks.

- Conduct walkthroughs of your premises regularly, even if you don’t
have a wireless network.

- Keep a list of all authorized APs. Remember, Rogue APs aren’t
necessarily only placed by attackers.A well-meaning employee

can install APs as well.

--- Thank You ---

James Conack
http://www.centronet.uni.cc
Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
Solutions Fast Track - Monitoring and Intrusion [email protected] Home Repair 0 July 21st 08 03:51 AM
Water Intrusion Charles Bishop Home Repair 1 April 29th 07 06:33 PM
Rubbermaid fast track garage hang rail! [email protected] Home Repair 0 January 3rd 06 11:23 PM
Rubbermaid fast-track garage hang rail [email protected] Home Ownership 0 December 31st 05 06:25 PM
WATER INTRUSION DETECTION [email protected] Home Repair 2 November 8th 05 07:31 PM


All times are GMT +1. The time now is 08:35 PM.

Powered by vBulletin® Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Copyright ©2004-2024 DIYbanter.
The comments are property of their posters.
 

About Us

"It's about DIY & home improvement"