1 / 18

Wireless network security

Lt. Robert Drmola, University of defence, Communication and information system department. Wireless network security. Content. Home and corporal networks comparison Data protection Protection methods WLAN standards comparison Conclusion. Home versus organizations networks.

elle
Download Presentation

Wireless network security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lt. Robert Drmola, University of defence, Communication and information system department Wireless network security

  2. Content • Home and corporal networks comparison • Data protection • Protection methods • WLAN standards comparison • Conclusion

  3. Home versus organizations networks • WiFi – phenomenon of Czech republic (Internet providers policy) • Urgency of protection also small office and home networks • It has got advantages for hackers • Big organizations usually uses better access methods

  4. Reasons for wireless security • Computer criminality • Activities masking • Industrial espionage • Unauthorization access • Connectivity to internet

  5. Organizations data protection • 38% scans company network for unauthorized access points • 22% instruct employees about wireless network problems • 57% set up network policy • 33% without protection !!!!!

  6. Company data protection • Unauthorized (black) access point

  7. Company data protection • Ad-Hoc networks

  8. Basic methods • MAC filter activation • SSID change • Change of defaults parameters • IP • Admin password • Default cryptography keys • Argue out of 20% of attackers

  9. Advanced methods • WEP activation – Not so strong but better than nothing • WPA, WPA2 activation • Radius server activation • Alternative for SOHO networks (WPA-PSK)

  10. Corporal networks • WLAN protection on commercial and organizations level • User authentization: No authentization of devices but users – guard against stolen devices or device simulations

  11. Corporal networks • WLAN protection on commercial and organizations level • System interdependence: protect against unauthorized access points. Not only the client to network but also the network to client authorization.

  12. Corporal networks • WLAN protection on commercial and organizations level • Centralized management: All information about users, devices, access points are saved centrally. Easy for admins to change information but hard to attackers

  13. Corporal networks • WLAN protection on commercial and organizations level • Dynamical encryption keys: Different keys for every session and for every device and user.

  14. Security standards comparison IPSec - VPN WPA2-802.1x WPA2-802.1x Security level WPA2-PSK WPA-PSK WEP Open network

  15. Security standards for WLAN

  16. Idea and conclusion • WLAN protection: • Nowadays is possible to solve • WLAN security can be personalized for every kind of running • Solve encryption only in radio parts (IPSec, VPN)

  17. Conclusion • Security isn’t something what we can buy in box in our shop. It is unremitting fight between security experts and hackeres, which try to increase security level of our world. It requires persistent comparisons, tests and implementations. Unfortunately it can not be said: “Now - we protected our network and we can not solve this problem in future.”

  18. Lt. Robert Drmola, University of defence, Communication and information systems department Thank you for your attention

More Related