Page 127 - Courses
P. 127

IT Essentials — Assessing Infrastructure and Networks

            Wireless Access Points

            A wireless access point (WAP) provides wireless access to a network. Modern WAPs provide options
            for encryption, or scrambling and securing data transmitted, but because the technological world is
            advancing so rapidly, systems often fail to keep up with bad actors who attempt to override
            encryption features for their own purposes (usually/often criminal or malicious purposes).

            Corporate environments achieve wireless network access by broadcasting radio signals between
            hosts and access points. A WAP provides a range of options for the Layer 1 architecture of wireless
            service. Depending on the age of equipment used, several types of encryption may be used, or an
            organization may choose not to use encryption. Using weak or no encryption can expose the
            organization to additional risk, and it is a relatively inexpensive cost to upgrade wireless network
            components in order to increase security.

            Upgrading equipment or configuration of the entire user base to use newer encryption protocols can
            be a very large task. Examples of wireless encryption protocols (from lowest to highest level of
            encryption) include:

            Wired Equivalent Privacy (WEP) — an outdated security protocol that offers basic encryption. This
            protocol is typically used because it may be the only option for older infrastructures. Given sufficient
            traffic and even marginal computing power on a laptop or mobile device, WEP is easily penetrated
            and was superseded by the WPA protocol by the Wireless Fidelity Alliance in 2003.

            Wi-Fi Protected Access (WPA) — replaced WEP as a more secure security protocol for wireless
            networks. Like WEP, WPA should only be used if required by older infrastructure because it is
            vulnerable and provides less encryption than its successors.

            Wi-Fi Protected Access 2 (WPA2) — security protocol currently required on all devices considered Wi-
            Fi CERTIFIED by the Wireless Fidelity Alliance, providing stronger encryption algorithms than
            predecessors. It provides a degree of security from unauthorized access.

            Wi-Fi Protected Access 3 (WPA3) — provides individual data encryption, secures some “internet of
            things” (IoT) devices, protects against brute force (trial and error approach), dictionary attacks
            (using dictionary words to guess passwords), and offers the highest degree of protection.

            Demilitarized Zone: A Security Application

            A demilitarized zone (DMZ) is a portion of network contained between two firewalls, and protects the
            organization’s external-facing servers. The first firewall is outward-facing, or subject to the internet,
            and protects the DMZ systems. The outward-facing firewall has more exposure than the second
            firewall, which protects the interior network.








            Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.
   122   123   124   125   126   127   128   129   130   131   132