TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from:

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
CIT In this chapter you will learn how to:  Describe the basics of wireless networking  Explain the differences between wireless networking standards.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Technology & Security. Wireless Local Area Networks What is the IEEE? What is the IEEE? Institute of Electrical and Electronics Engineers Institute.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
By Alvin Tse.  FCC – Federal Communications Commission   IETF – Internet Engineering Task Force   IEEE –
Networks Olga Agnew Bryant Likes Daewon Seo.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Local Area Technology.  Garikayi Brasington Madzudzo  Edmund Nartey  Ismeil Ahamed  Jakub Gieryn  Arnaud Fogno.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wireless Networking.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
© Aastra – 2012 SIP-DECT 4.0 RFP 43 WLAN June 2012.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE Standards. First published in June Defines technologies at the Physical layer and the MAC sublayer of the Data-Link layer. The standard.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
A PRESENTATION ON “Wireless Networks”
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
A presentation On a,b,g Wireless LAN, and Preented By Md.Masum Hossain Pranjal Sinha Md.Munis Varun Jain Anmol Jain Nsumbu Noe.
Solving the Security Risks of WLAN Tuukka Karvonen
IWD2243 Wireless & Mobile Security Chapter 1 : Wireless Fundamentals Prepared by : Zuraidy Adnan, FITM UNISEL1.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Wireless Networking Chapter 12. Chapter Objectives Identify wireless networking Compare wireless and wired network Explain the different wireless standards.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Understand Wireless Security LESSON Security Fundamentals.
Discovery Internetworking Module 7 JEOPARDY K. Martin.
Wireless Networks Dave Abbott.
CompTIA Security+ Study Guide (SY0-401)
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from:

Agenda  Overview  Wireless Standards  Security Risks  How to fix security risks  How to install a wireless card  Wrap-Up

Overview  Wireless networks manipulate electrical charges in order to communicate between devices.  Wireless Networks use a type of electric current known as Radio Frequency (RF). Source: Wireless Security Primer 101

Wireless Standards  What are wireless standards? Agreements about how to communicate. Basically, this is what a network has to do to communicate to other networks. The original IEEE standard is a specification for wireless local area networks (WLANs) developed by the Institute of Electrical and Electronics Engineers (IEEE). There are several specifications in the family and new ones are occasionally added. gci341007,00.html

Wireless Standards  About Wireless Standards: Developed in 1989 Range of about 300 feet Many operate at 2.4 GHz range Transmit on Radio Frequencies rity_Primer_101.html

Wireless Standards  Outline of the current wireless standards Essentially, there is only one standard (802.11), it is constantly updated and revised by calling it names such as a, b, g, n, and so on. The a, b, and g amendments are the most popular techniques for over the air modulation that uses the same protocol as The i amendment is when security was included, and the other amendments (c-f, h-j, n) are all service enhancements or revisions. The n amendment is the newest standard, projected to be released in July

Wireless Standards  Regulations for Standards Wireless standards are regulated under Part 15 of the FCC Rules and Regulations. The frequency used by wireless standards b and g can be interrupted by microwave ovens and cordless telephones, for example. For this reason, a operates on a 5 GHz band in order to avoid this interference.

Comparing Wireless Standards StandardData RateSecurityPros/Cons & More Info IEEE Up to 2Mbps in the 2.4GHz band WEP & WPA This specification has been extended into b. IEEE a Up to 54Mbps in the 5GHz band WEP & WPA 8 available channels. Less potential for RF interference than b and g. Better than b at supporting multimedia voice, video and large-image applications in densely populated user environments. (Wi-Fi) IEEE b Up to 11Mbps in the 2.4GHz band WEP & WPA Requires fewer access points than a for coverage of large areas. Offers high-speed access to data at up to 300 feet from base station. 14 channels available in the 2.4GHz band. (Wi-Fi) IEEE g Up to 54Mbps in the 2.4GHz band WEP & WPA May replace b. Improved security enhancements over Compatible with b. 14 channels available in the 2.4GHz band. (Wi-Fi)

Future of Wireless Standards n: “January 2004 IEEE announced that it had formed a new Task Group (TGn) to develop a new amendment to the standard for wireless local-area networks. The real data throughput is estimated to reach a theoretical 540 Mbit/s (which may require an even higher raw data rate at the physical layer), and should be up to 100 times faster than b, and well over 10 times faster than a or g. It is projected that n will also offer a better operating distance than current networks.” Release DateOp. FrequencyData Rate (Typ)Data Rate (Max)Range (Indoor) 2007 July? ? ?540 Mbit/s ?

Security Risks  How does security in wireless technology affect the Accounting world?  What are Security Risks for wireless technology?  How does a company combat security risks?

Security Risks  Accidental Association  Identity Theft or MAC Spoofing  Ad-Hoc Networks  Man-in-the-Middle Image from:

Security Methods to Counter Risks  MAC ID filtering  Static Dynamic Host Configuration Protocol (DHCP)  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Lightweight Extensible Authentication Protocol (LEAP)  Protected Extensible Authentication Protocol (PEAP)  Temporal Key Integrity Protocol (TKIP)  Remote Authentication Dial In User Service (RADIUS)  And many others…

DHCP and PEAP  Uses pre-assigned addresses for each MAC ID and is quite helpful by keeping non-authorized users away from AP’s.  PEAP gives a secure transfer of data, passwords, and encryption keys Source:

WEP  Was the original encryption standard for wireless to be as safe as wired networks  “Secure” wireless network has never been achieved through a WEP because of flaws and the abilities of crackers to crack codes  TKIP helps avoid WEP problems with Source:

WPA  Uses a pre-shared key which establishes security by using a 8 to 63 character passphrase, or a 64 character hexadecimal  Updated version is known as WPA2, which includes the final IEE802.11i standard that includes a different algorithm Source:

RADIUS  Authentication, authorization, and accounting protocol used for remote network access  Most important function for accountants because is enforces user policies and restrictions and also records accounting information Source:

Securing a Wireless Network  Enable and configure WEP  Secure service set identifier (SSID) by changing the default SSID to a unique ID and changing it at frequent intervals.  Change passwords often Source: Wireless Security Primer Part I

Securing a Wireless Network  Change AP position. To do this run an important site survey to locate problems and only cover areas that are in need of coverage.  Use MAC filtering to grant access to those with an acceptable MAC ID.  Use RADIUS to maintain user profiles in a central database that all devices can share and use. Source: Wireless Security Primer Part I

Video for Wireless

Wrap-Up  The main takeaways: Wireless standards make it possible to transmit data without hardwires. Since wireless is relatively new, there are many security risks. Most of these risks can be combated through certain loopholes. USB Wireless Adapters are the most versatile. If you need assistance, ask your IT Department.

Thank you!  Any Questions? Ask your nearest Byron…. Image from: