Wireless Data Security Peter Michel CSC 8560 February 24, 2004.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
The Wireless Communication System Xihan Lu. Wireless Communication Cellular phone system Cordless telephone system Bluetooth Infrared communication Microwave.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
MOBILE PHONE ARCHITECTURE & TECHNOLOGY. HISTORY  The idea of the first cellular network was brainstormed in 1947  Disadvantages  All the analogue system.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Guerilla Warfare Balakumar Balasubramanian. Security Issues In Wireless/Mobile Networking.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
KARTIK DABBIRU Roll # EE
NETWORKS.
1 California State University, Fullerton Chapter 6 Information System Networks and the Internet.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
MOBILE COMMUNICATION G.S.M. & G.P.R.S.. Evolution of mobile telephone systems Cellular subscriber growth worldwide Currently more than 45 million cellular.
Module 5: Configuring Access for Remote Clients and Networks.
Chapter 4 Application Level Security in Cellular Networks.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Overview of cellular system
Elijah Suko & Jamie Kuolt. The Connected World  Networks Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN)
Module 10: Providing Secure Access to Remote Offices.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Access Point Extender/bridge Radio card SSID - Service Set Identifier “An identifier attached to packets sent over the wireless LAN that functions as a.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Twelve Network Security.
Network Communications Chapter 15 Wireless LANs. IEEE b 11 Mbit/s Encrypted (but questionable security) Figure 15.1: Peer-to-PeerFigure 15.2: Access.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Chapter 1: Explore the Network
MOBILE COMMUNICATION SYSTEM
Virtual Private Network
Visit for more Learning Resources
Network Infrastructure
5G MOBILE TECHNOLOGY By J.YOGESH 08M31A0425.
Virtual Private Networks (VPN)
DIFFERENT TYPES OF INTERNET CONNECTIONS.
Security Issues with Wireless Protocols
Chapter 8 – Data switching and routing
Presentation transcript:

Wireless Data Security Peter Michel CSC 8560 February 24, 2004

Introduction  This article deals with security features of several types of wireless networks CDPD CDMA GPRS VPN

Cellular Digital Packet Data  Secure reliable protocol typically used by law enforcement and public safety officials  Wireless modem communicates by radio to a base station which transfers the data by landline to an intermediary system and then through a gateway to the destination  Sophisticated authentication, RSA encryption of data  Possible to create private networks

Code Division Multiple Access  Started in WWII to control torpedoes and used for communication during Cuban Missile Crisis  Wide bandwidth, multiple packets  Not susceptible to eavesdropping, 64 bit key used for encryption and authentication  Recently used with Smart Card technology

General Packet Radio Service  Subscriber Identity Module Card, PINs provide equipment security  Authentication and encryption  Firewall to protect from outside connections

Virtual Private Network  Data is encrypted on VPN client and decrypted at server  Opens a secure tunnel; private network from any location  Low cost, flexible, standards based

Conclusion  These technologies provide security within the carriers network. It does not extend into the Internet  Resource: Wireless_Security.pdf