Wireless Security Threats and Solutions By: Shirene Turpin & Rob Waight.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Computer Viruses.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Securing a Wireless Network
Video Following is a video of what can happen if you don’t update your security settings! security.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
The Simple Side of Computer Security for The Brownies That Like To Read!!
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Topic 5: Basic Security.
Lecture 24 Wireless Network Security
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Computer crimes.
Computer Security By Duncan Hall.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Network Security
Security in Networking
Presentation transcript:

Wireless Security Threats and Solutions By: Shirene Turpin & Rob Waight

“Virii are wondrous creations written for the sole purpose of spreading and destroying the systems of unsuspecting fools. This eliminates the systems of simpletons who can’t tell that there is a problem when a 100-byte file suddenly blossoms into a 1,000-byte file. Duh. These low-lives do not deserve to exist, so it is our sacred duty to wipe their hard drives off the face of the earth. It is a simple matter of speeding along survival of the fittest.” -Anonymous Virus Creator

Wireless Security Threats Denial of Service Attacks Theft of Service Industrial and Foreign Espionage Rouge Access Points Malicious Code/Viruses

Wireless Security Threats Denial of Service Attacks The purpose is to deny the victims’ access to a particular resource, which usually means cutting off access to the service or network as a whole. The network is flooded with information, through flooding the 2.4GHz frequency or packet flooding.

Wireless Security Threats Theft of Service Hacker gains access to the internet or anything else by using someone else’s resources. Leads to a much more serious type of threat that can cost companies and individuals a lot of problems and money.

Wireless Security Threats Industrial and Foreign Espionage Specific to wireless networks, and is probably the most prominent, and often the most costly type of attack. Also known as sniffing or eavesdropping. Two types of eavesdropping: Passive and Active.

Wireless Security Threats Industrial and Foreign Espionage Passive: The attacker simply monitors the wireless session after gaining access to the transmission. The attacker can read the actual data being transmitted and learn about its source and destination. Active: The attacker must have access to the network itself so that instead of simply listening in, he or she may actually make changes to the packet itself.

Wireless Security Threats Rouge Access Points Unauthorized access points that leave open doors to a company’s network. Two types: unintentional and intentional. –An employee may wish to have more mobility at work, without setting up security parameters. –Hackers will mimic the current Access Point to gain access to the network.

Wireless Security Threats Malicious Code/Viruses Any program (or code) that is used intentionally to cause adverse affects to a system. Most commonly known as Viruses. Most threatening type of Virus is a Worm. For example, the Code Red worm replicated itself over 250,000 times in approximately nine hours on July 19, 2001.

Wireless Security Solutions Built-In Security Authentication Software Sniffing Ethical Hacking

Wireless Security Solutions Built-In Security Basic security built-in to standard devices usually shipped with features turned off. First level is to change the name of the SSID and turn broadcasting off. WEP (Wired Equivalent Privacy) makes data about as secure as it would be on an unencrypted wired network through encryption.

Wireless Security Solutions Authentication Uses keys to gain access to an access point. Most popular is EAP (Extensible Authentication Protocol) by calls for authentication from the server. A more secure form is Wireless Transport Layer Security (WTLS), since it calls for authentication of both the client and the server.

Wireless Security Solutions Software Make sure that each and every computer on the network has a reliable antivirus and firewall service that is updated regularly. Firewalls and ad-ware removers help guard against small everyday attacks and annoyances that can happen simply by stumbling onto the wrong website.

Wireless Security Solutions Sniffing Use hacker’s type of software to sniff network for unauthorized transmissions. Purchase products that search for new, unauthorized access points and notify the network administrator.

Wireless Security Solutions Ethical Hacking Ethical Hackers are hired by companies to create a secure environment by purposefully try to break into the network. Their job is to try to break into a company’s network, identify its weaknesses, and offer ideas to fix the holes that exist.

Questions?