Wireless security by prof russell jones
1 / 16

WIRELESS SECURITY by Prof. Russell Jones - PowerPoint PPT Presentation

  • Updated On :

WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES. Wireless connections are becoming popular. Network data is transmitted using radio waves. Physical security is no longer sufficient. Transmissions can be intercepted outside the building where the data originates.

Related searches for WIRELESS SECURITY by Prof. Russell Jones

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'WIRELESS SECURITY by Prof. Russell Jones' - denim

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Wireless security by prof russell jones l.jpg

WIRELESS SECURITYbyProf. Russell Jones

Wireless communication issues l.jpg

  • Wireless connections are becoming popular.

  • Network data is transmitted using radio waves.

  • Physical security is no longer sufficient.

  • Transmissions can be intercepted outside the building where the data originates.

How wireless networking works l.jpg

  • Institute of Electrical and Electronics Engineers (IEEE) 802.11 is the standard

    • 802.11b & 802.11g

  • Security Standard

    • 802.1x & 802.11i (June 2004)

  • Can use various upper-layer protocols

Wireless threats l.jpg

  • Theft of service

    • Free use of Internet access

    • Free use of applications

  • Eavesdropping

    • Confidential Information

    • Financial & Health Security Laws

  • Unauthorized access

    • Change of Data, insert viruses, disable system

Wired equivalency privacy wep l.jpg

  • Provides encryption and access control

    • Media Access Control

  • Uses the RC4 encryption algorithm

    • Originally - 24-bit and 40-bit encryption

    • New versions support 128-bit encryption

Wep keys l.jpg

  • An attacker can discover the WEP key by using a brute-force attack.

  • All computers use a single shared WEP key.

  • WEP does not define a secure means to distribute the key.

  • WEP designed to use manual distribution of keys

Advantages of wep l.jpg

  • All messages are encrypted.

  • Privacy is maintained.

  • WEP is easy to implement.

  • WEP provides a basic level of security.

  • Keys are user definable and unlimited.

Disadvantages of wep l.jpg

  • A hacker can easily discover the shared key.

  • You must tell users about key changes.

  • WEP alone does not provide sufficient wireless local area network (WLAN) security.

  • WEP must be implemented on every client and AP.

Wifi protected access wpa l.jpg
WiFi Protected Access (WPA)

  • Improved encryption using Temporal Key (TKIP)

    • Provides integrity testing

    • Scrambles the key fields

  • Use of smart card devices with EAP

  • Allows for MAC filtering

802 11i protocol june 2004 l.jpg
802.11i PROTOCOL (June 2004)

  • Improved authentication (PEAP, EAP)

    • Certificate-based (client and RADIUS)

    • Do not use EAP-MD5 (No protection to client password)

  • Requires authentication before access

  • Dynamic key assignment (Every 10 minutes)

  • Increased encryption (128-bit)

  • Adding preferred networks to clients

Authentication process l.jpg
Authentication Process

  • Wireless client contacts uncontrolled AP port

  • The AP requests identity of client

  • AP create a RADIUS request and transmits

  • RADIUS checks to see if AP is approved

  • Checks credentials and policies on client

  • If ok, AP generates WEP key and passed to client

  • Client access controlled port with WEP key

Wireless threats13 l.jpg
Wireless Threats

  • Attack by intruder with wireless connection

    • Use Switches instead of Hubs

  • ARP Spoofing

    • Warn client not to accept credential changes

  • Evil Twin Attack

    • Authentication of Access Points

  • WEP Attacks

    • www.airsnort.com & www.netstumbler.com

Basic defenses against wireless attacks l.jpg

  • Limit the range of radio transmissions.

  • Change the default SSID.

  • Disable SSID broadcast.

  • Use newer Access Points

  • Search for unauthorized access points (APs).

  • Restrict access by limiting access to specific media access control (MAC) addresses.

  • Separate the wireless segment from the rest of the network.

Basic defenses against wireless attacks15 l.jpg

  • Increase WEP encryption levels.

  • Change the default WEP keys.

  • Measure the signal strength.

  • Protect SNMP.

  • Do not use Shared Key Authentication

  • Secure clients

  • Use honeypots

Conclusion l.jpg

  • Access your particular security needs

    • Determine efficiency versus security trade-off

  • Any key is hackable

    • Use longest key feasible (not necessarily available)

    • Change as often as feasible

  • Remember the Wireless Rule

    • The more flexible access to a network is made, the less secure the environment