LM 5. Wireless Network Security

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Network Security.
Security in Wireless Networks Juan Camilo Quintero D
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
USRobotics Professional Access Point  Yosi Rafael.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Presented by: Dr. Munam Ali Shah
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Security fundamentals Topic 10 Securing the network perimeter.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Understand Wireless Security LESSON Security Fundamentals.
Security fundamentals
Wireless Ethernet Programming
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Methods of Securing LANs
TECHNOLOGY GUIDE THREE
Securing the Network Perimeter with ISA 2004
Wireless Network Security
Wireless Local Area Network (WLAN)
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Chapter 4: Wireless LANs
Security of a Local Area Network
Wireless Networking Chapter 23.
Understanding Network Security
IS4550 Security Policies and Implementation
Wireless LAN Security 4.3 Wireless LAN Security.
Firewalls Routers, Switches, Hubs VPNs
Introduction to Network Security
Configure a Wireless Router
Configure a Wireless Router
By Markus Kriechhammer
LM 7. Cellular Network Security
LM 7. Mobile Network Overview
Chapter 10. Mobile Device Security
LM 4. Wireless Network Threats & Vulnerabilities
Presentation transcript:

LM 5. Wireless Network Security Dr. Lei Li Wireless Security

Road Map Introduction WLAN Security Mobile Security Security Auditing & Risk Analysis Evolution of Wireless Network WLAN Overview Mobile Network Overview Infor. Security Essentials WLAN Threats & Vulnerabilities Cellular Network Security WLAN Security Mobile Security Threats WLAN Security Tools Mobile Devices Security

Learning Outcomes After this module, a student will be able to: Describe the architecture for securing wireless network List the measures to physically secure WLAN Describe the measures for access control and authentication in WLAN Discuss the issues of using VPN to secure WLAN Differentiate intrusion detection systems and intrusion prevention systems Describe the method of data protection using in enterprise wireless network Describe how to develop a comprehensive security policy for wireless network Describe the auditing process for a wireless network security

Security Architecture Customer needs Physical wireless network User Access Control & Authentication Encryption Comprehensive security policy

A Highly Secure Wireless Network WPA Source: https://www.cisco.com/c/dam/en_us/about/ac123/ac147/images/ipj/ipj_5-3/highly_secure.gif

Physical Security Contain of radio frequency (RF) signals Reduce RF leak Site modeling Placement of the AP Replace omni antenna with directional antenna AP power adjustment

WLAN Segmentation Isolate WLAN traffics from LAN traffics Easier for the WLAN traffic management Physical segmentation using switch Virtual LAN Larger WLANs Logically divide the network into groups using broadcast domains

Access Control SSID Obfuscation SSID cloaking Segment users by SSID/VLAN pair SSID cloaking Hide WLAN from unauthorized client Best practice for avoiding casual or opportunistic access to the network Not sufficient to defeat passive or active scanning

Access Control - MAC Filtering MAC address Physical address of the device Operates at OSI layer 2 Deny by default, permit by exception Suitable for small business or SOHO network Not effective control in WLAN as in LAN Attacker can monitor the network traffics and capture the MAC address

Access Control - VPN Extend private network across a public network

VPN over WLAN Secure WLAN using VPN Provide authentication, encryption, and privacy User’s IP address is obscured The performance of the network may suffer Requires user to install special software

VPN Protocols SSL VPN IPSec VPN Securely access the web from browser Set at IP layer More often used to allow secure remote-access to a private network

Authentication - Open authentication Image source: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034858

Authentication – Shared Key Authentication Image source: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034858

Authentication – EAP Extensible authentication protocol Image source: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034858

Authentication – MAC Based Image source: https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034858

802.1x Authentication Used for LAN or WLAN Use EAP Image source: https://en.wikipedia.org/wiki/IEEE_802.1X#Typical_authentication_progression

WLAN Authorization Authenticated users should have different permissions 802.1X for both authentication and authorization 802.1X funnel wireless traffic onto VLAN Group-based permissions Grouping wireless traffic using 802.1Q tags Create a link between authentication and authorization

Data Protection - Encryption WEP – not secure at all. WPA Temporal Key Integrity Protocol (TKIP) – backward compatible with WEP device WPA2 Advanced Encryption Standard (AES) – most secure

WPA3 New security standard announced in 2018 New features Robust protection - protect people who use weak password, brute force attacks Simplification of configuration and security for device with limited display interface Individualized data encryption for open Wi-Fi network CNSA compliance

Data Protection- IPSec Internet protocol security End-to-end security scheme Operates at OSI Internet layer Image source: https://www.slashroot.in/what-ipsec-and-how-ipsec-does-job-securing-data-communication

IPSec Image source: https://www.google.com/search?q=ipsec+tunnel+mode+vs+transport+mode&safe=active&source=lnms&tbm=isch&sa=X&ved=0ahUKEwi5vpj_n8nYAhUFRCYKHUGTANkQ_AUICigB&biw=999&bih=970#imgrc=8HftlxcUbTFmxM:

IPSec VPN vs. SSL VPN IPSec VPN SSL VPN Function at network layer Remote access to company office network resources Always on connection SSL VPN Function at application layer More granular access control Used in web browsers

Comprehensive Security Policy Risk analysis What to protect, value of the asset, possibility of breach, cost to protect the system Governing policies Technical policies End-user policies

Wireless Security Policy Define assets, risks and security objectives Identify required security practices and measures Dictate acceptable behavior and enforcement Serve as a vehicle for achieving consensus

Wireless Security Policy Content Policy objectives Ownership and authority Scope Risk assessment Security measures Acceptable usage Deployment process Auditing and enforcement

Wireless Security in Big Picture Security Auditing Identify issues and establish baseline for the network Physical Security Contain signals Access Control SSID MAC Authentication VPN Obfuscation Filtering 802.1x. IPSec Corporate Network Firewall, anti-virus, IPS, IDS Data Protection Encryption Authentication VPN WPA/WPA2 Filtering 802.1x. IPSec Comprehensive Security Policies User awareness and training, compliance consideration, etc.

Reference Praphul Chandra, Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security, ELSEVIER, 2005. Jim Doherty, Wireless and Mobile Device Security, Jones & Bartlett Learning, 2016. https://www.cisco.com/c/en/us/about/press/internet-protocol-journal/back-issues/table-contents-14/wireless-networks.html http://searchsecurity.techtarget.com/feature/Wireless-AP-placement-basics http://searchnetworking.techtarget.com/feature/Using-VLANs-to-compartmentalize-WLAN-traffic https://books.google.com/books?id=noWHCgAAQBAJ&pg=PA161&lpg=PA161&dq=ssid+bofuscation&source=bl&ots=CfCLH4fhhY&sig=93JeGN8aTOHZEGKUS7jNnGDpluE&hl=en&sa=X&ved=0ahUKEwin_7mA98TYAhVE0VMKHa9WB7IQ6AEIKzAA#v=onepage&q=ssid%20bofuscation&f=false https://www.cisco.com/c/en/us/td/docs/routers/access/wireless/software/guide/SecurityAuthenticationTypes.html#wp1034858 https://en.wikipedia.org/wiki/Virtual_private_network http://searchnetworking.techtarget.com/tip/WLAN-security-Beyond-the-VPN https://www.networksasia.net/article/what-are-differences-between-intrusion-detection-and-intrusion-prevention-1227715200 https://www.howtogeek.com/204697/wi-fi-security-should-you-use-wpa2-aes-wpa2-tkip-or-both/ https://en.wikipedia.org/wiki/IPsec https://www.calyptix.com/research-2/ssl-vpn-and-ipsec-vpn-how-they-work/ https://www.cisco.com/c/en/us/about/security-center/framework-segmentation.html http://www.ciscopress.com/articles/article.asp?p=1998559&seqNum=3 http://searchmobilecomputing.techtarget.com/tip/Creating-a-wireless-security-policy http://www.wseas.us/e-library/confereces/2008/bucharest/mcbe/13mcbe.pdf