security techniques (list)
secure baselines
harden mobile devices
harden workstations
harden network infrastructure devices
aka switches, routers, firewalls, etc.
harden cloud infrastructure
harden servers
harden scada/ics
extensive segmentation
harden embedded systems
-patches
-segment
-firewall
harden RTOS
harden IoT devices
site surveys
determine wireless landscape
heat maps
identify wireless signal strength
mobile solutions
deployment models (list)
BYOD
COPE
CYOD
MDM
manage company owned/user owned mobile devices
centralized management –> policies, manage access control
disadvantages of BYOD
difficult to secure
- secure company data * personal data
cellular network security concerns
traffic monitoring
location tracking
securing wireless network
WPA3
GCMP block cipher mode –> stronger encryption
has confidentiality & integrity
SAE
simultaneous authentication of equals//
uses a type of diffie hellmen key exchange
PSK Authentication process
mutual auth.
creates a shared session key without sending it across the network
—AAA framework—
some methods to increase your wireless security posture
disable uneeded services
encryption
secure user account
no remote administration
deploy MAC filtering
disable SSID Broadcast
authentication protocols (list)
RADIUS
EAP
IEEE 802.1X