Standard-based WLAN infrastructure and security solutions for the retail industry

For a long time, retailers have been the leading users of wireless LAN technology due to the need to quickly replenish inventory, reconfigure stores and change point-of-sale (POS) terminals, and communicate with a large number of mobile workers (clerk, warehouse manager and manager). One, the shadow of this technology can be seen in retail stores, distribution centers and corporate offices. But this widespread use of wireless technology also brings the possibility of data loss or theft. To prevent data theft, many retailers have deployed WLAN encryption and authentication methods. Although the protection is good, it only solves the wireless LAN security problem for the authorized traffic part. Unauthorized WLAN clients, access points (APs), and other devices are bound to pose a serious threat to the retailer's network integrity and the sensitive customer data they provide access to.

How to avoid wireless LAN security vulnerabilities in the retail industry

If you can't do protection from all angles, the wireless link may provide a good way to attack. This is no stranger to organized crime. They have launched several attacks on retailers through wireless LANs, which have caused several well-known retailers to face customer data and account loss, and have been exposed by wireless LAN security vulnerabilities. The punishment that comes.

Wi-Fi infrastructure can be of great benefit to businesses if they are securely deployed and managed. To protect the network from threats that can damage the network, cardholder data, and PCI compliance, retailers must be aware of the security vulnerabilities of unauthorized wireless access.

Understanding wireless threats

There are several scenarios for providing unauthorized core (wired) network access to outsiders through wireless LAN: a) authorized clients connect to neighboring WLANs; b) connect to core networks through rogue access points; c) The client connects to the ad hoc wireless network (a special peer-to-peer wireless mobile network). All of these scenarios may not occur out of the way, but they put the core network at risk.

Access to nearby WLANs

The capacity of a wireless network determines the likelihood that multiple adjacent retail stores, shopping centers, or local Wi-Fi networks will form an open, insecure network. Wireless signals are often outside the physical boundaries of the building or outside the building, so these signals may be received by retailers' offices, distribution centers, or stores. If the neighboring wireless WLANs do not take security measures, such as access rights without strong authentication or encryption, wireless client devices such as laptops, smartphones, and POS devices in the retail environment may be connected to unauthorized In WLAN. When connected to an unlicensed wireless WLAN, the user has unrestricted Internet access without corporate supervision. Unscrupulous employees in the company may use this route to disclose confidential information of retailers or customers. Even if this unauthorized connection is not intended by people, it can cause trouble. If the wireless device is also plugged into wired Ethernet, it is equivalent to the user building a bridge to the core network, providing full access to the merchant's privilege information.

Honeypot attack

A wireless stealing scheme, known as a honeypot attack, is known to take advantage of these inadvertent external WLAN connections. There are many definitions of "honeypots" in the field of security protection. Assuming a wireless LAN, a honeypot is equivalent to an access point configured to match the retailer's wireless LAN. Hackers can first establish an access point in the retailer's parking lot and then amplify the signal to attract authorized retail clients to connect to the honeypot instead of the retailer's network. Once connected to the spoofed access point, hackers can collect usernames and passwords and then use that information to log in (eg, break into) the retailer network as if they were employees of the enterprise.

Illegal access point

A rogue access point is an unauthorized AP that connects to the retailer's network. It usually occurs when a company employee wants to work in a work area and installs a wireless AP. Its starting point is not malicious. Unfortunately, consumer access points typically turn off their security features when they ship, so that when internal employees connect to the Ethernet from behind a firewall, they provide a direct link to outsiders. In addition, because retailers are the preferred target of such criminals, these deceptive access points make retailers vulnerable to unscrupulous identity thieves.

Configuring an inappropriate authorized access point

If an authorized access point is reset to the default settings, or vice versa, it loses security settings as an "open" access point, then it becomes a gateway to the core retail network.

Ad hoc wireless network

As wireless capabilities become more standardized in notebooks and become more popular in smartphones, printers, and even POS devices, Ad hoc wireless networks are becoming more open. Ad hoc wireless network refers to the formation of a network when two wireless settings are directly connected to each other. Since the Windows® operating system itself has this feature embedded and the feature defaults to the "on" state, this connection is very easy to set up. If the retailer's laptop is plugged into wired Ethernet at the same time, other wireless clients have unrestricted access to the retailer's network. Such access may reveal confidential information within the employee's computer and on the merchant's network.

Type-c HUB 3.0

This 10 -port USB 3.0 hub design uses 10 USB 3.0 port to extend to your computer, laptop, reader, network camera, moving HDD, Oculus, Oculus, printers and more USB devices.
This USB 3.0 fast data transmission driver The USB 3.0 center synchronization data transmission speed is as high as 5Gbps. Compatible with Windows XP / Vista / Win 7 / Win 8 / Win 10, Mac OS 10, Linux and above, compatible with USB 2.0 Connections.


10 Port Type-C HUB 3.0, USB HUB 3.0 10 Port, 10-Port USB Hub 3.0

shenzhen ns-idae technology co.,ltd , https://www.best-charger.com

Posted on