Technology, Issues, and Solutions by David Clark

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless LAN Security Shala VanGerpen December 8 th, 2005.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Securing a Wireless Network
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types x – A vs. B vs. G Which is best for.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless Networking and Security
Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson.
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
A History of WEP The Ups and Downs of Wireless Security.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Security: Protect yourself when you’re mobile.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Presented by: Dr. Munam Ali Shah
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Wireless Networking Nandakumar.P. Web Resource
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Setting Wireless Network At Home By: Parveen Sharma.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Wireless Security Tabatha Lakkala Outline 2  Wireless Access Points  Define Wireless Access Points  Hidden and not so hidden dangers  How to protect.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
How to hack into mobile phones via bluetooth & How to Hack Wireless Internet Connections in 3 Easy Steps PresentedBy Pradosh H.S.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Understand Wireless Security LESSON Security Fundamentals.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wi-Fi Technology.
CompTIA Security+ Study Guide (SY0-401)
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Network Computer Science Engineering Technical English II
Securing A Wireless Network
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Network Security
Three types of wireless technology
Wireless Networking Chapter 23.
Wi-Fi Technology.
PREPARED BY: RIDDHI PATEL (09CE085)
3.3 Mobile Digital Communication
Presentation transcript:

Technology, Issues, and Solutions by David Clark Wireless Security Technology, Issues, and Solutions by David Clark

Introduction Advantages of Wireless Technologies Trade-offs Convenient Easy to use Trade-offs Susceptible to security violations Requires more user knowledge

The Technologies Wireless Local Area Networks 802.11 Wireless Personal Area Networks Bluetooth Wireless Handheld Devices PDAs Phones

Wireless Local Area Networks IEEE defined the 802.11 standards for wireless networking 802.11 intended to provide the functionality of Ethernet, wirelessly using radio waves

Issues Default Hardware Settings WEP Encryption Weaknesses Mad-in-the-middle

Solutions WEP WPA/WPA2 MAC Filtering Disabled SSID Broadcasting End-to-end Encryption

Wireless Personal Area Networks Bluetooth was designed to be the basis of the Personal Area Network (PAN) a way for devices within relatively close proximity to communicate wirelessly with one another

Issues Default Settings Passkeys Faulty Encryption Scheme - E0 Privacy “Bluejacking” “Bluesnarfing”

Solutions Knowledgeable Use PIN Settings Limit Range Non Promiscuous

Wireless Handheld Devices PDAs Mobile Phones Most PDAs and mobile phones now contain sensitive personal and business information

Issues Sync “hijacking” Bluetooth/802.11 Data Access Malware Eavesdropping Loss/Theft

Solutions Secure Settings Password Protection Encryption Settings

Conclusion Risks are inherent in any wireless technology Some of these risks are similar to those of wired networks; some are exacerbated by wireless connectivity; some are new Knowledgeable users and sound security measures can make wireless technology practical and safe.