wireless security by prof russell jones
Download
Skip this Video
Download Presentation
WIRELESS SECURITY by Prof. Russell Jones

Loading in 2 Seconds...

play fullscreen
1 / 16

WIRELESS SECURITY by Prof. Russell Jones - PowerPoint PPT Presentation


  • 116 Views
  • Uploaded on

WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES. Wireless connections are becoming popular. Network data is transmitted using radio waves. Physical security is no longer sufficient. Transmissions can be intercepted outside the building where the data originates.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'WIRELESS SECURITY by Prof. Russell Jones' - denim


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
wireless communication issues
WIRELESS COMMUNICATION ISSUES
  • Wireless connections are becoming popular.
  • Network data is transmitted using radio waves.
  • Physical security is no longer sufficient.
  • Transmissions can be intercepted outside the building where the data originates.
how wireless networking works
HOW WIRELESS NETWORKING WORKS
  • Institute of Electrical and Electronics Engineers (IEEE) 802.11 is the standard
    • 802.11b & 802.11g
  • Security Standard
    • 802.1x & 802.11i (June 2004)
  • Can use various upper-layer protocols
wireless threats
WIRELESS THREATS
  • Theft of service
    • Free use of Internet access
    • Free use of applications
  • Eavesdropping
    • Confidential Information
    • Financial & Health Security Laws
  • Unauthorized access
    • Change of Data, insert viruses, disable system
wired equivalency privacy wep
WIRED EQUIVALENCY PRIVACY (WEP)
  • Provides encryption and access control
    • Media Access Control
  • Uses the RC4 encryption algorithm
    • Originally - 24-bit and 40-bit encryption
    • New versions support 128-bit encryption
wep keys
WEP KEYS
  • An attacker can discover the WEP key by using a brute-force attack.
  • All computers use a single shared WEP key.
  • WEP does not define a secure means to distribute the key.
  • WEP designed to use manual distribution of keys
advantages of wep
ADVANTAGES OF WEP
  • All messages are encrypted.
  • Privacy is maintained.
  • WEP is easy to implement.
  • WEP provides a basic level of security.
  • Keys are user definable and unlimited.
disadvantages of wep
DISADVANTAGES OF WEP
  • A hacker can easily discover the shared key.
  • You must tell users about key changes.
  • WEP alone does not provide sufficient wireless local area network (WLAN) security.
  • WEP must be implemented on every client and AP.
wifi protected access wpa
WiFi Protected Access (WPA)
  • Improved encryption using Temporal Key (TKIP)
    • Provides integrity testing
    • Scrambles the key fields
  • Use of smart card devices with EAP
  • Allows for MAC filtering
802 11i protocol june 2004
802.11i PROTOCOL (June 2004)
  • Improved authentication (PEAP, EAP)
    • Certificate-based (client and RADIUS)
    • Do not use EAP-MD5 (No protection to client password)
  • Requires authentication before access
  • Dynamic key assignment (Every 10 minutes)
  • Increased encryption (128-bit)
  • Adding preferred networks to clients
authentication process
Authentication Process
  • Wireless client contacts uncontrolled AP port
  • The AP requests identity of client
  • AP create a RADIUS request and transmits
  • RADIUS checks to see if AP is approved
  • Checks credentials and policies on client
  • If ok, AP generates WEP key and passed to client
  • Client access controlled port with WEP key
wireless threats13
Wireless Threats
  • Attack by intruder with wireless connection
    • Use Switches instead of Hubs
  • ARP Spoofing
    • Warn client not to accept credential changes
  • Evil Twin Attack
    • Authentication of Access Points
  • WEP Attacks
    • www.airsnort.com & www.netstumbler.com
basic defenses against wireless attacks
BASIC DEFENSES AGAINST WIRELESS ATTACKS
  • Limit the range of radio transmissions.
  • Change the default SSID.
  • Disable SSID broadcast.
  • Use newer Access Points
  • Search for unauthorized access points (APs).
  • Restrict access by limiting access to specific media access control (MAC) addresses.
  • Separate the wireless segment from the rest of the network.
basic defenses against wireless attacks15
BASIC DEFENSES AGAINST WIRELESS ATTACKS
  • Increase WEP encryption levels.
  • Change the default WEP keys.
  • Measure the signal strength.
  • Protect SNMP.
  • Do not use Shared Key Authentication
  • Secure clients
  • Use honeypots
conclusion
CONCLUSION
  • Access your particular security needs
    • Determine efficiency versus security trade-off
  • Any key is hackable
    • Use longest key feasible (not necessarily available)
    • Change as often as feasible
  • Remember the Wireless Rule
    • The more flexible access to a network is made, the less secure the environment
ad