Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:08
Welcome to Paolo Alto Network. Cyber Security Academy
00:12
Secure Business Systems Administration presentation on WiFi end advanced, persistent threats
00:21
Advanced. Persistent threats exist in several forms.
00:25
They may be inadvertently or unintentionally initialized by an end user who installs 1/3 party app, er tool. Or they may exist through a failure to apply proper security patches and updates for older legacy applications and appliances such as routers and switches.
00:42
Advanced persistent threats also may be deliberately initialized by a trained cracker who is attempting to enumerates or discover and stealthily gather valuable information.
00:54
AP TI Threats may exist for long periods of time without any detection or warning events and an A P T exploit can occur suddenly without warning. As in a zero day attack,
01:07
wireless networks present several complicated cybersecurity challenges. Unlike Wired networks, wire was devices from different networks share the same media on the airwaves. So even though a business may have a secured wireless network, network performance can be negatively impacted
01:23
by external devices that are not part of the company. Wireless lan.
01:27
That could include employees, personal phones or neighbor businesses, and more
01:34
Further complications arise from these devices and appliances that automate or initiate their wireless services by default.
01:42
Many printers. Why was personal devices such as Bluetooth watches and other Internet of things devices automate their wire with services and seek to connect automatically without our knowing it?
01:55
Wire was Services can also overlap, and risks occur when employees, networks and guess networks are often trying to us access the same routers and appliances.
02:07
So a Pts can exist as a tax that can be delivered from both trusted. Why was endpoints as well as road devices?
02:15
An end user personal phone may actually contain an app that is present and visually monitoring and seeking to attempt to exploit or infiltrate any available network. Additionally, Rainbow attacks are designed to exploit what are the hash values or encrypted passwords?
02:32
A rainbow table can allow an attacker to look up the hash value
02:37
and de deus the underlying password that was encrypted into the hash value. So to defend against rainbow attacks and users need to use highly complex passwords. And that's something that they often fail to do, especially with their own personal wireless devices. Man in the middle attacks
02:54
often include what's called an evil twin impersonation, so the end user really has no idea
03:00
that they're actually connecting to an impersonated or spoof devise. So cyber security professionals need to employ detection software and also perform regular wire with surveys to ensure that these evil twins these impersonated devices
03:16
or road devices do not exist within their own business perimeters.
03:24
So standard protection methodologies for wireless networks include using updated security protocols and also disabling service, said identify our broadcasts
03:35
Regularly changing an SS I devalue can help us well
03:38
in a business network. We often use multi factor authentication tools such as Octa that require an additional confirmation or authentication certificate, sometimes through a personal registered device.
03:53
But nevertheless, no matter what we dio, as soon as we use a shared media space such as a wireless network, threats will always persist.
04:01
Cybersecurity professionals will face constant wire with security in a PT challenges, and so they need to look as to how they can integrate their wireless network services into their enterprise security platforms.

Up Next