Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.

Slides:



Advertisements
Similar presentations
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
Advertisements

Jaringan Komputer Lanjut Jaringan Nirkabel (Wireless LAN) -Aurelio Rahmadian-
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Securing a Wireless Network
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Instructor: Dr.Hanal ABUZANT
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wireless Networks Tamus, Zoltán Ádám
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Lecture 11 Wireless security
Presented by: Dr. Munam Ali Shah
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Sybex CCNA Chapter 12: Wireless Networks Instructor & Todd Lammle.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Remote Access for Mobile Computing Andrew Jessett NT Support and Development Group (a.k.a. PC Support) Business and Information.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
CCNA3-1 Chapter 7-2 Chapter 7 Basic Wireless Concepts and Configuration Part II.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless LAN Concepts. Wireless LAN Standards.
Chapter-7 Basic Wireless Concepts and Configuration.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
LOGO Wireless 25-Sep-16Jaringan Komputer_D3 TT_IT Telkom1.
CCNA Exploration Semester 3 Chapter 7
Basic Wireless Concepts and Configuration Part II
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Network connectivity to the legacy wired LAN
A Wireless LAN Security Protocol
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Configure a Wireless Router
Network connectivity to the legacy wired LAN
By Markus Kriechhammer
Presentation transcript:

Wireless LAN Security Oleh: R. Muhamad Ramadan

Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain free internet access Hackers (Crakers) Exploit weak privacy measures to view sensitive WLAN information and even break into WLANs Employees Plug consumer-grade APIs/gateways into company Ethernet ports to create their own WLANs Rogue Access Point is an access point placed on a WLAN that is used to interfere with normal network operation.

Ancaman Thd Keamanan Wireless 2 Man-in-the-Middle Attacks AP Client Attacker collects information Attacker intercepts traffic

Ancaman Thd Keamanan Wireless 3 Denial of Service b dan g menggunakan unlicensed 2.4 GHz ISM band. Band ini digunakan oleh banyak produk pelanggan spt microwave oven, cordless phone, dll.

Denial of Service Common consumer devices can Interfere with WLAN devices Causing denial of service

Denial of Service Attacker turns laptop into an access point. Attacker can send CTS messages or disassociate commands Clients flood WLAN causing collisions and denying service

Wireless Security Protocols 1 Wireless Protocol Overview

Wireless Security Protocols 2a Authenticating to the Wireless LAN Access PointClient Association

Wireless Security Protocols 2b Authenticating to the Wireless LAN AuthenticatorSupplicant EAP

Wireless Security Protocols 3 Encryption

Securing Wireless LAN Controlling Access to the Wireless LAN Methods for controlling wireless LAN access: SSID broadcasts from access points are off MAC Address filtering is enabled WPA2 Security implemented

Securing Wireless LAN Controlling Access to the Wireless LAN Probe request: SSID = NULL No probe respone MAC address not recognized Meets all requirements