James Tucker Dr. Durrett ISQS 6342

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Presented by Serge Kpan LTEC Network Systems Administration 1.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Network Security
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Securing a Wireless Network
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Uday O. Ali Pabrai, CISSP, CHSS Chief executive, HIPAA Academy Health care & HIPAA Security Remediation.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
COEN 252 Computer Forensics
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Protecting Your Wireless Network Protecting Your Wireless Network University of Tasmania School Of Computing 2007.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
● Albert Einstein explained it best: ● "You see, wire telegraph is a kind of a very, very long cat. You pull his tail in New York and his head is meowing.
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Access Point Product Overview
Troubleshooting Networked Video
WIRELESS INTRUSION DETECTION SYTEMS
CSCE 548 Student Presentation By Manasa Suthram
Instructor Materials Chapter 6 Building a Home Network
Instructor Materials Chapter 9: Testing and Troubleshooting
Securing A Wireless Network
Security and Wireless LANs
Implementing Network Access Protection
CompTIA Network+ Certification Exam Question Answer
Click to edit Master subtitle style
Chapter 11: It’s a Network
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Chapter 4: Wireless LANs
Introduction to Networking
Wireless Hacking.
Wireless Network Security
Security of a Local Area Network
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless Network Security
Network hardening Chapter 14.
6. Application Software Security
LM 5. Wireless Network Security
Presentation transcript:

James Tucker 459650490 Dr. Durrett ISQS 6342 Wired or Wireless? James Tucker 459650490 Dr. Durrett ISQS 6342

Summary Food for Thought Corporate Level University Level Public Access Level

Food For Thought1 10 Steps to Secure a Wireless Network Control your broadcast area Lock each AP Ban rogue access points Use 128-bit WEP Use SSIDS wisely Limit access rights Limit the number of user addresses Authenticate users Use RADIUS Call in the big boys

Control your broadcast area: wireless access points allow for control of signal strength, and some direction. Place in center of area. Lock each AP: people don’t change the darn defaults! Change them – and MAKE IT GOOD!!! (www.pcmag.com/passwords, click on password dos and don’ts) Ban rogue access points: if you have an AP on your network, make sure you put it there. (www.netstumbler.com)

Use 128-bit WEP: adds a layer of difficulty Use 128-bit WEP: adds a layer of difficulty. HOWEVER easily cracked with freeware (http://airsnort.shmoo.com) Use SSIDS wisely: Change the defaults – AGAIN! Service Set Identifiers (SSIDS) show all your AP information. Also, buy a product that allows you to disable broadcasting the SSIDS. Limit access rights: Authorized MAC cards only!

Limit # of user addresses: constrict the # of DHCP addresses to just enough – then if you have some connection trouble you know you have unauthorized access! Authenticate users: firewalls with VPN connectivity, and require log-ons. Use RADIUS: provides another authentication method (time of day & simultaneous) – can be pricey. (www.freeradius.org) Call in the big boys: AirDefense, server appliance that monitors activity and protects traffic on LANs – really pricey ($10k - $100k depending on # sensors)

Corporate Level Attacks to Consider: WEP Attacks WAP Attacks Brute Force

Corporate Level Security Design IT Sub Department Diagram User Levels Spec Hardware Spec Software Diagram User Levels Define User Access Define LAN Architecture (Wired and Wireless) Define DMZ’s Define Firewall Protocols Define Wireless Sniffing Tools

Corporate Level IT Sub Department: ruthless individuals Spec Hardware based upon needs (# of AP’s defined by # of users, etc…) Go for 802.11a!!! Spec Software based upon required security Granted – Pocketbook is King Diagram User Levels: who needs access to what? Employee status, Employee Area, Employee Expertise

Corporate Level Define LAN Architecture: Does the entire building need wireless? Remember 10 steps. Hardwire offices, meeting rooms, etc… Wireless for open spaces, floor level access for IT employees Define DMZs: What is available online? What is available to Wireless protocols?

Demilitarized Zones

Corporate Level Define Firewall Protocols Allow only ports and protocols needed Kill Telnet, ping, port-scan, etc… Define Wireless Sniffing Tools Use of sniffers to determine unauthorized access is becoming more and more popular. Example: Wavelink’s Mobile Manager. (www.wavelink.com, www.mcafee.com)

Mobile Manager by Wavelink Reduction of DNS attacks through Access Point profiles (streamlining of all AP profiles)

University Level Treat it like Corporate: Much less likely to have money requirements of 802.11a, BUT: Securing 802.11b is defined by: Broadcast area Sniffing Restricting # Users Restricting Access Rights

University Level Use of 802.11b requires more physical security: Wardriving still possible Attacks through Staff Attacks through dormatories Requires a very accurate listing of User MAC addresses Requires accurate accounting for DHCP address use

University Level Time of Day lockdown implementation Set-up of DMZ is critical Just as important as securing corporate data is securing sensitive University data Grades, Degree Plans, Financial Information, etc… Building by building better than broadcast cloud

Public Access Level Problems: Answers Unlike Corporate or University Level, listing MAC addresses is more difficult. Creating the correct DMZ cloud Answers Setting up an account service requiring MAC addresses of users Creating architecture of system before implementation!

Closing Be Smart and Realize that no network is perfect! Hire Good People with a diverse background in Security (More eyes and ears!) Restrict User Access Restrict Number of Users Use of Sniffing Tools Change the Defaults!

Reference Security Watch, PC MAGAZINE, February 25th, 2003, www.pcmag.com. Hacking Exposed, McClure, Scambray, Kurtz, McGrawHill, Chicago, 2001. Secrets & Lies, Schneier, Wiley, New York, 2000. Cisco AVVID Network Infrastructure Enterprise Wireless LAN Design, Adobe Acrobat Presentation, www.cisco.com, 2003.

Questions? Queries? Posers? Inquiries? Huh?