IGillottResearch An Introduction to Wireless Security WebCast Iain Gillott Charul Vyas April 23, 2002.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Mobile and Wireless Security INF245 Guest lecture by Bjorn Jager Molde University College.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network and Internet Security
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
WIRELESS LAN SECURITY Using
Wireless and Security CSCI 5857: Encoding and Encryption.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Understand Internet Security LESSON Security Fundamentals.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Virtual Private Networks
Securing Information Systems
IPSec Detailed Description and VPN
Module 9: Configuring Network Access
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Wireless Protocols WEP, WPA & WPA2.
Virtual Private Networks
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
Virtual Private Networks (VPN)
Security in Networking
Server-to-Client Remote Access and DirectAccess
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Goals Introduce the Windows Server 2003 family of operating systems
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Module 8: Securing Network Traffic by Using IPSec and Certificates
Introduction to Network Security
Chinese wall model in the internet Environment
Public-Key, Digital Signatures, Management, Security
Cengage Learning: Computer Networking from LANs to WANs
Unit 8 Network Security.
Advanced Computer Networks
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

iGillottResearch An Introduction to Wireless Security WebCast Iain Gillott Charul Vyas April 23, 2002

iGillottResearch Agenda Security Basics Mobile Security Why is Mobile Security important? Can we have too much security? Authentication WLAN Security Recommendations

iGillottResearch Security Basics AAA Authentication, Authorization, Auditing Identity of an end user is verified e.g. biometric Remote access dial-in user service (RADIUS) is the best known and most widely used AAA protocol Nonrepudiation In the physical world, nonrepudiation is achieved through handwritten signatures Digital signatures — a string of unique bits attached to a message — fill that need The challenge is that there is very little legal recognition yet for digital signatures. Encryption Process of encoding information in such a way as to make it inaccessible

iGillottResearch Security Basics … PKI Digital certificates (“certs”) are electronic credentials that bind the identity of a certificate owner to a pair (public and private) of electronic keys that can be used to encrypt and sign digital information Not an end all security method because digital certificates from different vendors do not interoperate Wireless PKI Issue is limited UIs, processors, bandwidth, memory, battery life on mobile devices Limited effectiveness of PKI

iGillottResearch Security Basics … IPSec IP security Implemented at the IP layer (Layer 3 of the OSI Model) Creates secure tunnels between users and/or hosts Encapsulates each data packet in a new packet Contains the information necessary to set up, maintain and tear down the tunnel when it is no longer needed Designed to provide VPN technology and connectivity SSL Secure Sockets Layer Very effective in securing communications in an open user group Originally developed by Netscape Adopted by the IETF as the transport layer security (TLS) protocol WAP Forum has incorporated a modified version of SSL/TLS technology into its WAP specification, calling it wireless TLS (WTLS)

iGillottResearch Mobile Security Why is Mobile Security Important? Recent proliferation of wireless data capable devices Enterprises and individuals are beginning to make use of wireless data Access corporate data and applications Wireless is a shared medium Inherently less secure than conventional wireline connectivity Steps need to be taken to ensure the privacy and authentication of data transmitted Security becoming increasingly important to enterprises Security concerns are sited as a main reason why companies do not mobile In many cases, perception of problem greater than the actual problem

iGillottResearch Why is Security Lacking? Problems with mobile and portable solutions Two main issues: Lack of user authentication to the device and/or network Lack of encryption or sufficiently strong encryption to deter motivated intruders Good security starts with four basic principles: AAA (authentication, authorization and auditing), integrity, privacy and nonrepudiation Besides the authentication issues, wireless suffers from lack of strong encryption, or lack of any type of encryption at all

iGillottResearch Can we have too much Security? Problem is that we can make a solution so secure it is unusable If need a PIN, blood sample, retina scan and PKI just to check a bank balance, few will use the application Only the User can decide what level of security is appropriate for specific applications Security profiles therefore need to be portable …and flexible

iGillottResearch WAP and WTLS WAP security is provided by the wireless transport layer security (WTLS) protocol Based on SSL Optimized for use in the high latency, low bandwidth wireless networks Provides data integrity, confidentiality/privacy, and authentication WTLS has three different classes: Class 1 Uses an unauthenticated Diffie-Hellman key exchange to establish the session key Class 2 Forces server-side authentication using public key certificates WTLS certificate used by WAP is “thinner,” having been optimized for use on wireless networks Class 3 Implements the server-to- client/client-to-server mutual authentication that is optionally used in SSL

iGillottResearch The WAP Gap Two legs on the data path from a WAP handset through gateway to content server From the content provider to the WAP gateway in the carrier network via IP and SSL From the carrier WAP gateway to the handset via WAP and WTLS The WAP gap is the result of having to convert between WTLS and SSL WAP Forum responded by removing the WAP gap in version 2.0 through the use of: Dynamic proxy navigation (DPN) Manual proxy navigation (MPN)

iGillottResearch Viruses There have been few instances of viruses that targeted wireless devices One Palm OS No real viruses on the Symbian OS No known malware for Windows Pocket PC devices Yet … As more smart devices enter the market it is likely that more viruses will spring up Just as broadband wireline connectivity allows always-on access, so too will IP-enabled phones … Such exposure in the wireline world means that personal firewall software on the modem/PC is a must … It is reasonable to expect such firewall applications will be needed on IP phones

iGillottResearch Authentication Robust user authentication will help solve many of the problems discussed Accomplished via a variety of methods: Strong username/password access implemented consistently across all devices deployed by the enterprise Use of token-based access, such as SecurID Requires live access to the SecurID server so the entered PIN can be matched against the server’s expectations Biometric solutions integrated into the device itself or on a smart card PKI could also be implemented on the smart card and phone/device, with key exchange and certificate validation happening when the card is inserted into the phone The best user authentication is two-factor based Username/password in combination with a token; or with biometrics

iGillottResearch WLAN Security Security Flaws PKI can be used to address the failing of b’s security mechanism, wired equivalent privacy (WEP) WEP is flawed because Algorithm itself uses too short a key - 40-bits Keys are shared between the client and its access point Basic WEP contains no provision for the secure distribution and management of those keys Fixes IPsec VPNs are the best and easiest way to secure WLANs Security can be extended to a local domain of WLAN users as well as to those users that remotely access the network IPsec also contains standard provisions for key distribution and management

iGillottResearch WLAN Security … Authentication IEEE is currently working on the 802.1x standard which incorporates extensible authentication protocol (EAP) support into networks As a result, WLANs can use RADIUS servers, quite often already deployed within an enterprise, to authenticate users

iGillottResearch Recommendations No one can guarantee airtight security Enterprises can take steps to increase security Should not be an issue that stops wireless solution implementation Recommendations: Adopt and enforce a corporate-wide policy governing the use of mobile devices Selected devices should contain support for current security/technology standards User-to-device/user-to- network authentication technology is available and should be deployed Understand that deployment of wireless PKI, in either a mobile and/or portable environment, is a risky Security fixed from one WLAN provider many not carry over to another vendor Consider IPsec VPNs as a way to secure the WLAN

iGillottResearch Recommendations … Test the hackers weapons against the network Do not allow employees to install their own WLANs For Wireless Vendors Does your solution support the necessary security? Security is a long term issue As IP networks and devices proliferate, new issues will arise Management of physical device Management of keys, etc Nework management Virus protection RADIUS management

iGillottResearch Questions? Iain GillottCharul Vyas (512) (512)