{"id":192,"date":"2011-09-04T22:17:00","date_gmt":"2011-09-04T22:17:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/09\/04\/control-14-wireless-device-control\/"},"modified":"2011-09-04T22:17:00","modified_gmt":"2011-09-04T22:17:00","slug":"control-14-wireless-device-control","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-14-wireless-device-control\/","title":{"rendered":"Control 14: Wireless Device Control"},"content":{"rendered":"
Wireless network access allows for better collaboration and mobility. With this relatively new medium comes an extra risk. Be sure to handle this administratively through the use of policy and user education to set clear expectations of appropriate use. Specific policy reference should be made that prohibits the use of peer to peer wireless networking.<\/p>\n
Several popular Linux distributions provide pre configured Kismet<\/a>. Use these platforms to continually run on old laptops in each office location. For no cost, a continual assessment for wireless activity can be performed. As each access point is identified, white list any approved and neighbor business access point and include them in the Wireless Usage policy. All others must be classified as neighbor businesses or rogues to be investigated and disabled.<\/p>\n Discovery of wireless access points can also be performed using traditional network scanning tools, such as Nessus<\/a>. Using the plugin 11026<\/a>, daily complimentary scans can help identify rogue and authorized access points. Combining both wired and wireless scanning tools will help identify wireless usage in the environment.<\/p>\n