Sure, not everybody uses Intel products or components for wireless networking, but nearly everybody uses PCs on such networks. Perhaps that's why the company's Wireless Security Resource Center is such a trove of wireless security information and guidance, or perhaps they're just trying to seduce visitors into changing brands. Either way, you'll find the items available through the Resource Center both useful and interesting.
Here's a quick snapshot of what you'll find there:
- Develop a Wireless Security Plan...
By describing basic, enhanced, and maximum wireless security measures, and leading readers through the trade-offs involved in implementing them, Intel makes it surprisingly easy to dig into wireless security topics as simple as changing SSIDs and turning off SSID broadcasting to implementing 802.11i and performing a security audit. Each item in all three security plans is explained clearly, with step-by-step discussion of how to do the necessary work to make each one happen.
- Hot spot Security Measures:
Explains what individual PC owners should do to protect themselves if they choose to hook up to a hotspot while away from trusted networks at work or at home. Along the lines of Microsoft's "Protect Your PC" pitch, they recommend installing a personal firewall, limiting financial transactions to secure servers, turning off file and print sharing, and considering VPN services. Other resources at this page also include how to locate and connect to a hotspot, and information about reliable, trustworthy wireless ISPs.
- What's at Risk When You're Unsecured?
A short, sweet overview of vulnerabilities that come from leaving wireless networks wide open. Coverage includes several obvious potential threats ranked by risk level (but the coverage in the Wireless Security Plan section does a much better job of explaining nuts and bolts about what to do to tighten up a wireless network).
Though it's by no means the only site a budding wireless security maven might need to visit (more on those later), it's not a bad place to start. It's also a great, approachable resource for your Uncle Bob or Cousin Cindy who might otherwise expect you to hold their hands (or manage their wireless networks) if they didn't have access to such readable, friendly information.
Ed Tittel is a full-time writer, trainer, and consultant. He's written widely on security topics, including security policy tips for SearchSecurity.com, certification prep books for TICSA, CISSP, and Security+, and as a contributing editor for Certification magazine. E-mail Ed at firstname.lastname@example.org.