Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Fed Wireless Networks Need Tighter Security, NIST Says

Government standards body issues guidelines designed to reduce security vulnerabilities in WLANs.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Federal agencies should do more to consider the security of wireless networks before they deploy them because of the particular protections these networks require, according to the federal national standards organization.

A report by National Institute for Standards and Technology (NIST), released last week, provides guidelines for securing wireless local area networks (WLANs) in federal agencies. These networks are more vulnerable to intrusion due to the ease of access to them and what are often weak security configurations, as people tend to "favor convenience over security" when deploying them, according to NIST.

Pointing out these particular security needs, the report recommends that agencies set standards for configuring the security of these networks, as each component of the network--including the end-user devices that use the network--depend on this configuration.

To do this, NIST recommends an agency or organization first gather information on both the operational and security needs of the network, taking into consideration any laws and policies outside of the organization itself that might govern the network. This could mean meeting requirements of the Department of Homeland Security, Office of Management and Budget, and other agencies that have jurisdiction over agency cybersecurity, according to NIST.

[The feds are taking a new approach to combat growing threats to national security. Learn more: Homeland Security Revamps Cyber Arm.]

They also should consider not only security of the network itself but how the WLAN may affect other networks that exist nearby, according to NIST. Wireless networks are often connected to wired networks, as well as to each other, so agencies may have to consider separations between them based on security needs.

NIST also recommended that agencies continuously monitor WLANs because of their increased security risks--identifying and applying patches and verifying security configuration settings and adjusting them regularly.

"These actions should be performed at least as often for WLAN components as they are for the organization's other systems with similar security needs," according to NIST.

Indeed, continuous monitoring is a theme that has become pervasive in federal security as agencies strive to be more proactive about protecting networks rather than waiting for a problem to occur.

The Federal Information Security Management Act (FISMA), NIST's standard for federal security implementation, recently required agencies to begin reporting security data monthly to an online compliance tool called CyberScope as part of new fiscal year 2011 requirements for continuous monitoring.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Aviation Faces Increasing Cybersecurity Scrutiny
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/22/2019
Microsoft Tops Phishers' Favorite Brands as Facebook Spikes
Kelly Sheridan, Staff Editor, Dark Reading,  8/22/2019
MoviePass Leaves Credit Card Numbers, Personal Data Exposed Online
Kelly Sheridan, Staff Editor, Dark Reading,  8/21/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-08-23
The authentication applet in Watchguard Fireware 11.11 Operating System has reflected XSS (this can also cause an open redirect).
PUBLISHED: 2019-08-23
An Improper Neutralization of Input During Web Page Generation ("Cross-site Scripting") in Fortinet FortiNAC 8.3.0 to 8.3.6 and 8.5.0 admin webUI may allow an unauthenticated attacker to perform a reflected XSS attack via the search field in the webUI.
PUBLISHED: 2019-08-23
Lack of root file system integrity checking in Fortinet FortiManager VM application images of all versions below 6.2.1 may allow an attacker to implant third-party programs by recreating the image through specific methods.
PUBLISHED: 2019-08-23
In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this im...
PUBLISHED: 2019-08-23
The webtoffee "WordPress Users & WooCommerce Customers Import Export" plugin 1.3.0 for WordPress allows CSV injection in the user_url, display_name, first_name, and last_name columns in an exported CSV file created by the WF_CustomerImpExpCsv_Exporter class.