Wireless intrusion detection
Source: The Hindu - Posted by Alex   
Wireless Security When most people think of wireless, they think only in terms of access and not in terms of attacks or intrusions, say David D. Coleman and David A. Westcott in ‘CWNA: Certified Wireless Network Administrator Official Study Guide’ (www.wileyindia.com). They emphasise, therefore, on the need to constantly monitor for the many types of attacks because of the potential damage they can cause. Proactive enterprises, however, deploy a WIDS (wireless intrusion detection system) before deploying the wireless network that is meant to provide access.

Wireless can be an intrusive technology, and if wired data ports at a business are not controlled, any individual (including employees) can install a rogue access point, the author’s caution.

The typical WIDS is a client/ server model that consists of three components, they describe. The first is WIDS server, a software/hardware server acting as a central point of management. Management consoles, the second component of the model, connect back to the WIDS server as clients, and can be used for 24/7 monitoring of wireless networks.

Read this full article at The Hindu

Only registered users can write comments.
Please login or register.

Powered by AkoComment!