Security Basics mailing list archives

RE: Wireless security question


From: "Hamlesh Motah" <admin () hamlesh com>
Date: Wed, 22 Dec 2004 22:47:56 -0000

So essentially you want to prevent people who have wireless network
cards from connecting onto your network, bridging with a wireless
network, and transferring data that way.

What would stop them copying sensitive data to their laptop and just
walking out of the office with it.  This would be simpler than the
network bridging.

Seasonal greetings :)

Hamlesh Motah.
Managing Director, Hamlesh Consultants Ltd.
 
tel: +44 (0)870 762 2424
fax: +44 (0)870 762 3834
mob: +44 (0)709 212 0732
ema: admin () hamlesh com
web: www.hamlesh.com
 
Hamlesh Consultants - IT Consultancy - Total Solutions Provider.
 
Any opinion expressed in this e-mail or any attached files are those of
the individual and not necessarily those of Hamlesh Consultants Ltd.
This e-mail and any attached files are confidential and intended solely
for the use of the addressee.  This communication may contain material
protected by law from being passed on.  If you are not the intended
recipient and have received this e-mail in error, you are advised that
any use, dissemination, forwarding, printing or copying of this e-mail
is strictly prohibited.  If you have received this e-mail in error
please contact the sender immediately and destroy all copies of it.
 
 


-----Original Message-----
From: Marty [mailto:groupecci () yahoo ca] 
Sent: 22 December 2004 16:57
To: Sec Basic
Subject: Wireless security question


Hi gang!

Here is a question for you...

We have a secure network with no wireless
connections whatsoever.

One of our laptop came in with credentials to log
on to the network through the Ethernet cable BUT
the person had just added a wireless card to his
laptop.

This situation actually came up and the person
could see external wireless networks (from other
companies around our building) and access
Internet through there. Yeah I know they're
stupid, but it's the real world!

This seems like a potential threat for taking our
data out the back door. 
Copy files accessed through our network to
another network and voilà! No trace at all of the
mischief.

We monitor internet access and block non-company
Email (Yahoo, Hotmail etc.).

Suggestions?

Thanks and Happy Holidays!

Marty!


__________________________________________________________
Lèche-vitrine ou lèche-écran ?
magasinage.yahoo.ca



Current thread: