You are responsible for strengthening the controls on the network. How would you review the current state and future state and provide recommendations for the network? Why would you need to set access control for the wired connections and wireless access points?
Access Controls
Corporate LANs require protection to ensure confidentiality of data sent across the network, but they must
also provide access controls so that only authorized users are allowed on the network. In modern companies,
an intruder can access wired LANs from a wall jack or Ethernet wires, and wireless LANs can be accessed by
radio through an unprotected wireless access point. After gaining this access, an intruder can use a packet
sniffer to detect, intercept, and read traffic. To prevent this from happening, access controls must be utilized in
both wired (Ethernet) networks and wireless networks.
Ethernet LAN security utilizes standards such as 802.1X (port-based access control), extensible
authentication protocol (EAP), and radius servers—each of which functions in different ways and contains
different authorization, audit, and authentication features. These standards and protocols are detailed in your
Chapter 4 readings.
Wireless networks are often attacked using one of three major attack forms:
1. unauthorized access to the network;
2. an attack using an “evil twin,” which is also known as a man-in-the-middle attack; or
3. wireless DoS attacks, which are similar to the DoS attacks we discussed earlier in that their main aim
is to negatively impact the availability of a network.
These attacks prevent the host from accessing a wireless network by utilizing tactics such as flooding the
frequency with electromagnetic interference (EMI) or radio frequency interference (RFI). These tactics make
data packets unreadable due to “noise,” or disturbances in the electrical signal. Another method is to flood the
access point (AP), which would result in the AP using all of its resources to send and receive attack packets
and thereby effectively deny access to any other host. Lastly, attack commands can be sent to APs or clients
that result in a continuous stream of spoofed messages, request-to-send (RTS) frames, or clear-to-send
(CTS) frames that prevent clients from connecting to the AP.