Security Pro VIP--February 7, 2008

In this Issue:

  • Perspective: A Secure Wireless Network More Important than Ever
  • Coming this Month
  • January 2008 Articles in Print-Friendly Format
  • Share Your Security Tips and Get $100
  • The Security Pro VIP Forum

Perspective: A Secure Wireless Network
More Important than Ever

More functions are getting packed into our wireless devices all the time, which makes the devices ever more useful and important to us. Of course that also means that protecting the devices and the communications between them and the servers with which they interact becomes more important too. I was reminded of that by a couple of reports I read recently.

In the Security UPDATE "In Focus" commentary "What to Expect in 2008," January 9, 2008, Mark Edwards cites wireless networks as being ripe for widespread attacks because of the combination of many wireless networks being open for anyone to use and the existence of vulnerabilities in wireless routers.

AirMagnet, a provider of wireless network performance and security solutions, said in a set of wireless predictions for 2008 that "Over the next year, enterprises will understand that WEP is obsolete—better measures must be taken to ensure effective wireless network security."

If you've taken steps to secure your wireless network, that’s great. But if you're still counting on Wired Equivalent Privacy (WEP) or you think your network might have other weaknesses, you can find help for moving to Wi-Fi Protected Access (WPA) and for taking other wireless network security measures in the articles listed below.

Security Pro VIP articles:

Reaping the Benefits of WPA and PEAP, June 2006
Follow these detailed instructions to secure your wireless LAN with this powerful combination of protocols.

3 Ways to Rein in Your Wireless Signals, April 2006
Foil intruders by containing your wireless Access Point’s (AP’s) radio waves.

Map Out Your Wireless-Security Audits, May 2005
A few hardware and software tools let you put together a visual representation of the wireless networks in your area.

Security UPDATE “In Focus” commentaries:

Tweaking Wi-Fi APs for Better Security, September 21, 2005
Third-party firmware for APs lets you manage transmission output power and shape the pattern and direction of signal transmission. Find out how AP firmware works in this introductory article, then click the following firmware names to learn more about these products: DD-WRT, OpenWRT, Talisman, and Thibor.

Windows IT Pro articles:

Windows Vista’s Wireless Security, December 2007
Learn about Vista’s new features for protecting your wireless clients.

Enterprise Wireless Routers, April 25, 2007
This Buyer’s Guide lets you compare wireless routers and their security features.

Wireless-G: Faster, Cheaper, More Secure, September 24, 2003
An introduction to the 802.11g standard.

Top 10: Tips for Wireless Security, July 2003
This article might be a little dated but still contains some good tips for protecting your wireless LAN from 802.11b's deficiencies.

Renee Munshi, Security Pro VIP Editor

Coming this Month

"Fortify Remote-Server Security" by Jan De Clercq
Attacks on branch-office domain controllers can spread to your entire forest. Read-only DCs help Windows Server 2008 reduce that risk by eliminating multimaster replication, limiting password caching, and restricting the reach of local administrators.
This article is now live on the Web.

"Office 2007's Security Features in a Legacy Office Environment" by Russell Smith
Use Microsoft Office Isolated Conversion Environment (MOICE) to bring the more secure Office 2007 file formats to earlier Office versions. And learn about Office 2007's File Block, encryption, and authentication features.
Coming February 14.

Toolbox: "Create a Live CD on a Bootable USB Flash Drive" by Jeff Fellinge
Create a USB 2.0 flash drive that boots a Live CD distro—it's portable, fast, and easy to use.
Coming February 21.

Access Denied
Randy Franklin Smith answers your Windows security questions.
Coming February 28.

January 2008 Articles in Print-Friendly Format

If you're someone who prefers your newsletters in printed form, look in this .zip file. It contains all the security articles posted on the Security Pro VIP Web site in January in one .pdf file, and it includes some accompanying code. Print the .pdf and enjoy!

Share Your Security Tips and Get $100

Share your security-related tips, comments, or problems and solutions in Security Pro VIP's Reader to Reader column. Email your contributions to [email protected]. If we print your submission, you'll get $100. We edit submissions for style, grammar, and length.

The Security Pro VIP Forum

The Security Pro VIP forum is your place to ask questions about security topics and about articles posted on the Security Pro VIP Web site and to get answers from other forum members, including Orin Thomas, forum moderator, and article authors. Let's talk!

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.