Security in Wireless Networks Juan Camilo Quintero D. 1041718.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
A History of WEP The Ups and Downs of Wireless Security.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Module 48 (Wireless Hacking)
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

Security in Wireless Networks Juan Camilo Quintero D

Wireless Network Is a network that allows its users to connect to a local network or Internet without being physically connected. The data are transmitted through the air. Types: Wireless PAN, LAN, MAN.

Common Problems Piggybacking Phishing Steal information Attacks from intruders (WEP, Wardriving, Warchalking, signal reduction).

WEP Wired Equivalent Privacy. Use 40 bits keys or 104 bits keys. Was created in Use the same key periodically to encrypt the data.

TKIP Temporal Key Integrity Protocol. Changes the keys dynamically when the system is use.

WPA Wi-Fi Protected Access The WPA was created by “Wi-Fi Alliance” The information is encrypt by RC4 algorithm with a 128 bits key.

WPA2 WPA is consider a “migration” version, but, WPA2 is the certificate version of IEEE. Was created in Use the encrypt algorithm AES (Advance Encryption Standard).

IPSec IP Security. Set of protocols for security in IP communications by authenticating and / or encrypting each IP packet. The IPSec protocols are located in layer 3 of OSI model. Was developed for use with new IPv6 standard, but later was adapted to IPv4.

RADIUS Remote Authentication Dial-In User Server Is a protocol AAA (Authentication, Authorization, Administration). First, require an username and password, the access data are passed to a NAS device, then to a RADIUS server where it checks that the information is correct. If accepted, the server will grant access to the ISP system and select an IP address.

Advices Change the password. Use WEP/WPA encryption. Change SSID. Disable SSID broadcasting. Enable MAC address filter. Establish maximum number of devices that can connect. Disable DHCP. Disconnect point access when it is not in use.

Webgraphy mbricas/book1.html mbricas/book1.html dad/wireles.html dad/wireles.html municaciones/Seguridad_en_redes_inalambri cas_WiFi.shtml municaciones/Seguridad_en_redes_inalambri cas_WiFi.shtml os/SeguridadWireless.pdf os/SeguridadWireless.pdf n%20redes%20inalambricas.php n%20redes%20inalambricas.php