Secure Wireless Infrastructure
Undoubtedly, the scheduled installation and use of wireless data transmission technologies within an enterprise environment adds significant operational advantages. The use of wireless transmission technologies, however, involves significant risks for the security of transmitted information and the involved management systems.
During the implementation of a wireless network, security is often underestimated as opposed to functionality and especially when people use multiple devices to join the network (such as laptops, smart phones, tablet pc). A wireless network that does not apply basic security principles results in the exposure not only the enterprise infrastructure but also of all sensitive data that are being handled. Attackers can intercept communications by recovering easily the authentication key. They are also able to place their "fake" Access Points in the enterprise infrastructure, thus gaining access to both the internal network and the enterprise resources.
Secure wireless infrastructure design, strong authentication mechanisms (Public Key Infrastructure), Network Access Control and AAA systems, strong encryption algorithms (WPA-2) during transmission, centralized management of wireless network, Wireless Intrusion Prevention / Detection Access Points.