BYOD for UAE University
The current UAEU Wireless WPA2-
Enterprise has some powerful built-in
security features. However, it is still
vulnerable to attacks, which presents a
number of challenges the IT team takes
seriously.
Support of 802.1x is inconsistent
across devices, even within the same
OS, and each device has unique
characteristics that can make them
behave unpredictably.
The existing WPA2 Enterprise forces
users to only connect to the more
secure UAEU Official Wireless SSID
(UAEU-SkyNet). However, a secure
UAEU have set up password expire
policy on a regular basis face addi-
tional burden with WPA2-Enterprise.
Password expired user lose wireless
connectivity until reconfigured.
Challenge # 1: Device Variation
Challenge # 3: Password
Change Problem
Challenge # 2: MITM (Man-
in-the-Middle) Attack
connection is meaningless if any hon-
eypot or imposter signal is
inplace.Wedo detect rogue access points, includ-
ing Man-in-the-Middle attacks, but
users can still be vulnerable. A person
with a laptop can quietly gather user
credentials wherever devices might
pass through and try to auto-connect.
Sajid Ali
3 |
October 2017
DoIT Newsletter