Wireless & Network Security

Key Takeaways

  • WPA3 is the recommended wireless security standard — it uses SAE for authentication, provides forward secrecy, and offers Enhanced Open (OWE) for encrypting open networks.
  • Enterprise wireless security uses 802.1X authentication with a RADIUS server, providing individual user credentials instead of a shared pre-shared key (PSK).
  • Firewalls filter network traffic based on rules — configure to block all traffic by default and only allow what is explicitly needed (deny by default, allow by exception).
  • A VPN encrypts all traffic between a remote user and the corporate network, protecting data in transit on untrusted networks (public Wi-Fi, internet).
  • Common network attacks include man-in-the-middle (intercepting communications), DNS spoofing (redirecting traffic), ARP poisoning (mapping MAC addresses incorrectly), and DDoS (overwhelming a service with traffic).
Last updated: March 2026

Wireless & Network Security

Wireless Security Best Practices

Security Protocol Selection

  1. WPA3-Enterprise — Best (802.1X + RADIUS, 192-bit encryption)
  2. WPA3-Personal — Excellent (SAE, forward secrecy)
  3. WPA2-Enterprise — Good (802.1X + RADIUS, AES)
  4. WPA2-Personal — Acceptable (PSK + AES)
  5. WPA — Avoid (TKIP, vulnerabilities)
  6. WEP — NEVER USE (broken, crackable in minutes)

Wireless Hardening Checklist

ActionPurpose
Change default SSIDRemoves manufacturer identification
Change default admin passwordPrevents unauthorized router access
Enable WPA3 (or WPA2 minimum)Encrypts wireless traffic
Use a strong passphrase12+ characters, complex
Enable MAC filteringAdditional layer (not reliable as sole security)
Disable WPS (Wi-Fi Protected Setup)WPS PIN is vulnerable to brute force
Update firmware regularlyPatches security vulnerabilities
Reduce signal strengthLimits coverage to needed area only
Enable AP isolationPrevents wireless clients from seeing each other

802.1X / RADIUS Authentication

Enterprise-grade wireless security:

ComponentRole
SupplicantClient device requesting access
AuthenticatorAccess point or switch (passes auth requests)
Authentication ServerRADIUS server that validates credentials

Process: Client connects → AP forwards credentials to RADIUS → RADIUS validates against directory (Active Directory) → Access granted or denied

Key Advantage: Each user has individual credentials (username/password or certificate) rather than a shared password. When an employee leaves, disable their account — no need to change the Wi-Fi password for everyone.


Firewall Configuration

Firewall Types

TypeDescriptionExample
Host-basedSoftware firewall on individual computerWindows Defender Firewall, iptables
Network-basedHardware appliance protecting entire networkCisco ASA, Fortinet, pfSense

Firewall Rules

Rule ComponentDescription
Source IPWhere traffic originates
Destination IPWhere traffic is going
PortService being accessed (80, 443, 22, etc.)
ProtocolTCP, UDP, ICMP
ActionAllow or Deny

Best Practice: Deny all traffic by default, then create explicit allow rules for needed services. This is called a "deny all, permit by exception" approach.

Windows Firewall

  • Accessed via Control Panel or wf.msc (Windows Defender Firewall with Advanced Security)
  • Separate rules for Domain, Private, and Public network profiles
  • Inbound rules control incoming connections; Outbound rules control outgoing connections
  • Can create rules by program, port, predefined, or custom

Common Network Attacks

AttackDescriptionPrevention
Man-in-the-Middle (MitM)Attacker intercepts communications between two partiesUse HTTPS/TLS, VPN, certificate pinning
DNS Spoofing/PoisoningCorrupts DNS cache to redirect traffic to malicious sitesDNSSEC, clear DNS cache, use trusted DNS
ARP PoisoningFalsifies ARP messages to redirect LAN trafficDynamic ARP inspection, static ARP entries
DDoSOverwhelms a server/network with massive trafficDDoS mitigation services, rate limiting
Deauthentication AttackForces wireless clients to disconnect from APWPA3, 802.11w management frame protection
Brute ForceTries all possible password combinationsAccount lockout, strong passwords, MFA
Dictionary AttackTries common words/phrases as passwordsStrong passwords, MFA
Rogue DHCP ServerUnauthorized DHCP server assigns incorrect network configDHCP snooping on managed switches
Zero-DayExploits unknown vulnerability (no patch available)Defense in depth, behavior-based detection, keep updated

Data Destruction and Disposal

When decommissioning storage devices, data must be properly destroyed:

MethodDescriptionUse Case
Standard FormatMarks space as available but data is recoverableNOT secure
Low-Level FormatWrites zeros to every sectorHDD only (not SSDs)
Secure Erase (ATA)Firmware-level complete eraseSSDs and HDDs
DegaussingStrong magnetic field destroys dataHDDs and magnetic tapes (destroys device)
Physical DestructionShredding, drilling, incinerationAll media types (most secure)
Encryption + Destroy KeyEncrypt drive, then destroy the encryption keySSDs (crypto-erase)

Exam Tip: Degaussing does NOT work on SSDs because SSDs use electronic storage, not magnetic storage. For SSDs, use secure erase or physical destruction.

Test Your Knowledge

In an 802.1X wireless authentication setup, what role does the RADIUS server play?

A
B
C
D
Test Your Knowledge

Which data destruction method does NOT work on solid-state drives (SSDs)?

A
B
C
D
Test Your Knowledge

What firewall approach denies all traffic by default and only allows explicitly permitted traffic?

A
B
C
D