1. Introduction Wireless Local Area Network (WLAN) are everywhere this days starting from home to large enterprise networks due to the ease of installation, employee convenience, avoid wiring cost and constant mobility (Md. Waliullah, Diane Gan, 2014).The rapid growth in wireless has been argued to increase danger from network attacks which also increases challenges to organisation, IT staff and IT security professionals. Different proposals have implemented secure wireless LAN by improving encryption standards and authentication mechanism.
Having best encryption and authentication mechanism does not guarantee physical security in public premises in which wireless LAN are installed especially on campus, hospitals and other government institutions. Currently, most organisations are using door locks, security officers, video monitoring and electronic access control systems to protect their network infrastructure devices from physical threats which becomes a burden to IT security professionals due to controls that are put in place to enhance security such as administrative, technical and physical control (Vacca, 2013). Threats can enter any wired network via wireless network as Access Point is bridging between wireless and wired network which can be caused by Rough Access Point or Network resources misuse in the network (Hassan, 2013). Sobh, Tarek Salah (2013) said Rogue Access Point is a common threat in wireless LAN which results from attaching an unauthorized access point into the network. He described a Rogue AP in short, as any untrusted or unknown device running in your wireless LAN (Sobh, June 2013). These devices can have many effects and none of them is good in terms of the network.
Rogue AP normally don’t meet the WLAN network security standard and this can be the main target for hackers to get access into your network. According to Dhiman1′, Deepika (Jan. 2014) poor physical placement of Access Point can give easy access to attackers to reset an Access Point to manufacture default settings using a reset button which later become a Rough Access Point after losing its security configuration. In addition, Network resources misuse has been described as a threat that can degrade the network connection speeds and consume bandwidth. This problem arise from improper use of network resources by those who are authorised to use them, as well as use of resources by individuals not authorised to use the resources at all (Vacca, 2013). Bad practice can hinder the overall WLAN performance which affect the productivity of everyone on the wireless network.
Many employee in organisation come up with their own solutions by using home-use AP which does not meet the organisational security standard, presenting security risk, poor performance and network abuse. This also bring us to a conclusion that most of the security threat are caused by trusted individuals within organisations. Physical security should be considered as fundamental in network security although previous studies have described it as a minor issue that can be handled by service providers during implementation.