Wireless Local Area Network (WLAN): Security Risk Assessment
and Countermeasures Nwabude
Arinze Sunday - 52 - o Have filters been used to prevent unauthorized protocols (e.g., ARP, RIP, SNMP,
NetBIOS) from passing through the AP into the wired network o Are filters available/used to block user-to-user wireless o Is the right ESSID and channel in use by the AP o Are AP’s security parameters consistent with defined policy o How long does it take to crack the key if WEP is in use o Is the AP emitting any known weak initialization vectors (IVs o Is the AP’s PreShared Key (PSK)
is easily crackable, if it is in use o If the AP is not using WPA2, are WPA2 upgrades available o Can the AP withstand simulated 802.11 DoS attacks (e.g.,
Authenticate floods Share with your friends: