473,395 Members | 1,823 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,395 software developers and data experts.

Solutions Fast Track - Monitoring and Intrusion

Dear Reader,

Designing for Detection
----------------------------
- Get the right equipment from the start. Make sure all of the
features you need, or will need, are available from the start.

- Know your environment. Identify potential physical barriers and
possible sources of interference.

- If possible, integrate security monitoring and intrusion detection
in your network from its inception.

Defensive Monitoring Considerations
------------------------------------------
- Define your wireless network boundaries, and monitor to know if
they’re being exceeded.

- Limit signal strength to contain your network.

- Make a list of all authorized wireless Access Points (APs) in your
environment. Knowing what’s there can help you

immediately identify rogue APs.

Intrusion Detection Strategies
-----------------------------------
- Watch for unauthorized traffic on your network. Odd traffic can be a
warning sign.

- Choose an intrusion detection software that best suits the needs of
your environment. Make sure it supports customizable

and updateable signatures.

- Keep your signature files current.Whether modifying them yourself,
or downloading updates from the manufacturer, make sure

this step isn’t forgotten.

Conducting Vulnerability Assessments
-------------------------------------------
- Use tools like NetStumbler and various client software to measure
the strength of your 802.11b signal.

- Identify weaknesses in your wireless and wired security
infrastructure.

- Use the findings to know where to fortify your defenses.

- Increase monitoring of potential trouble spots.

Incident Response and Handling
--------------------------------------
- If you already have a standard incident response policy, make
updates to it to reflect new potential wireless incidents.

- Great incident response policy templates can be found on the
Internet.

- While updating the policy for wireless activity, take the
opportunity to review the policy in its entirety, and make

changes where necessary to stay current. An out-of-date incident
response policy can be as damaging as not having one at all.

Conducting Site Surveys for Rogue Access Points
-------------------------------------------------------
- The threat is real, so be prepared. Have a notebook computer handy
to use specifically for scanning networks.

- Conduct walkthroughs of your premises regularly, even if you don’t
have a wireless network.

- Keep a list of all authorized APs. Remember, Rogue APs aren’t
necessarily only placed by attackers.A well-meaning employee

can install APs as well.

--- Thank You ---

James Conack
http://www.centronet.uni.cc
Jul 21 '08 #1
0 911

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: sreekanth.hari | last post by:
I have a seemingly tough assignment for my Senior Project. I need to develop an Intrusion Detection System. My approach is to parse the bash_history file of each user into a mysql database,...
6
by: Cable | last post by:
Hello, I am hoping that someone can answer a question or two regarding file access. I have created an app that reads an image from a file then displays it (using OpenGL). It works well using...
9
by: Tim D | last post by:
Hi, I originally posted this as a reply to a rather old thread in dotnet.framework.general and didn't get any response. I thought it might be more relevant here; anyone got any ideas? My...
16
by: dfaber | last post by:
Hi all, I have been searching for a keyboard and mouse tracker on linux. I've read solutions (watch at sourceforge) which look at /proc/interrupts to check keyboard or mouse activity. I also read...
1
by: tpawleska | last post by:
Anyone know of a good software for Intrusion Detection, I want something that will alert me when a user is locked out and keep a log. I need this for Sarbane's Oxley purposes.
0
by: Sharath | last post by:
"Inspired" by the huge success of our first two automation fast track batches We are forced to start third fast track automation batch ...
0
by: Sharath | last post by:
We are glad to inform you that "Inspired" by the huge success of our first three automation fast track batches We are forced to start fourth fast track automation batch ...
0
by: Sharath | last post by:
We are glad to inform you that "Inspired" by the huge success of our first four automation fast track batches We are forced to start fifth fast track automation batch ...
4
by: lillykalai | last post by:
Hi, i like to do a project in network intrusion detection...whether it is easy to implement in java or C++...give ur valuable information and suggestions regarding this topic,it will be very...
0
by: origami.takarana | last post by:
Dear Reader, Designing for Detection ---------------------------- - Get the right equipment from the start. Make sure all of the features you need, or will need, are available from the start....
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.