Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
PYP002 Intro.to Computer Science Introduction to Networks1 Networks Chapter 17.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
C ONNECTING YOUR NETWORK National 4/5 Computing Science.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
Fundamental of wireless network.  Heinrich Hertz discovered and first produced radio waves in 1888 and by 1894 the modern way to send a message over.
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Chapter 5 Networks Communicating and Sharing Resources
ECE 578: COMPUTER NETWORK AND SECURITY
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Understanding Networks. What is a Network?  A network consists of two or more computers that are linked in order to share resources (such as printers.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Certain security vulnerabilities exist in every mode of wireless communications.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
Group 04 ( and Group 13 ) – From Lecture 04, Due Session 02.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Basic Computer Knowledge. Outline Notes 1 Notes 2 Assessment.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Lecture 24 Wireless Network Security
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Networking Basics 8th Grade
By Matthew. Advantages: Can share and keep information private within a network Workstations do not need a hard drive to access the information Users.
Topic : 4.0 WIRELESS TECHNOLOGIES.  Wireless networks utilize radio waves and/or microwaves to maintain communication channels between computers. Wireless.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Wireless LAN’s and How it has Taken Its Place in Society By Robert Harris.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Computer threats, Attacks and Assets upasana pandit T.E comp.
Activity 1 5 minutes to discuss and feedback on the following:
Understand how a router works and its purpose
Introduction to Networking. What is a Network? Discuss in groups.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Securing Interconnect Networks By: Bryan Roberts.
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
Understand how a router works and its purpose
Wireless LAN Dr. Mohammad Rafiq Ahmad A. Al-Dossary
LAN, WAN, and Network Topologies
SUBMITTED BY DINEEJ A 28 S3 EC
Planning & System Installation
IT Vocab IT = information technology Server Client or host
Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network.
Presentation transcript:

Wireless security

Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING & TECHNOLOGY

INTRODUCTION wireless networking –readily available, affordable and easy to use. popularity of wireless networking in private and commercial areas business. Interfaces with public areas. Some Wi-Fi operaters do not deploy any network security. Wired Equivalent Privacy as its default security protocol— widely recognized as being easily broken.

Unauthorised Access cases Access to Computers : To deface/change information To obtain information To copy information To affect operation

Access to Networks : To obtain access To mask identity

Wireless Hacking Examples of possible conduct or security failure. exploiting the vulnerability of a wireless network to hack into the computer or computer system. unauthorized (or in excess of authorization) access to a computer to steal information for their own purposes (data theft). unauthorized (or in excess of authorization) access to a computer to deface information for their own purposes (malicious hackers). Eavesdropping: monitoring the wireless transmissions. interception of electronic communication. intentionally disclosure of the contents of electronic communication.

Privacy Challenges Anything connected can potentially be tracked Who should be able to track what? Balancing business benefits and privacy – e.g., track the product in the store, but not on the consumer Cryptography offers new tradeoffs

WLAN Security: Why it matter? International concerns. Access point ≈ Wireless Hub Difficult to trace attackers Low cost hacking equipment Typical insecure WLAN deployments Lack of user/admin security awareness Technology limitations & vulnerabilities

WLAN Security Threats 1. Jamming or denial ofservice attack GHz RF jamming

WLAN Security Threats User hijacking & Man-in-the-middle attack Inverse Wardriving Sniff & Modify Fake server Https hack Password stealing “Phishing”

Advantages It is easier to add or move workstations. It is easier to provide connectivity in areas where it is difficult to lay cable. Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings. Access to the network can be from anywhere within range of an access point. Portable or semipermanent buildings can be connected using a WLAN. Although the initial investment required for WLAN hardware can be similar to the cost of wired LAN hardware, installation expenses can be significantly lower.

Disadvantages As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly. As standards change, it may be necessary to replace wireless cards and/or access points. Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN. Security is more difficult to guarantee and requires configuration. Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.

· Computer Networks by Tannenbaum ·Computer Networks by Forouzan REFERENCES

Thank You