In order to mitigate the rogue access point
effectively the secured wireless system is required. The
recommendation of secured wireless system is
summarized as the follows:
1) Wireless Security Policy: Wireless Security
Policy plays key role to guide the company to the
right direction of secured wireless. Policy presents
the commitment on the security issues. It should
clearly state the important of security,
unauthorized access point will not be allowed and
also state the consequence of policy violation.
Furthermore, there shoud be the regular
announcement or reminder about the security
policy to employees.
2) Wireless Risk Assessment: Annual wireless risk
assessment is also essential. Wireless risk
assessment analyzes the threat, vulnerability and
the impact. Wireless risk assessment provides the
priority of how importance we should protect our
system.
3) Wired and Wireless Network Separation: There
should be the network separation for the wired
network and wireless network (shown in Figure
7). This common practice provides the good
security due to the different security requirements
of wired and wireless LAN. Therefore, different
security measures are applied to each network. In
the enterprise wireless network, the information of
access points installed in the company will be
registered. The information includes MAC address
of access point, SSID (ID of wireless network),
Channel, the installed location and etc.