Wireless Network Security

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Mr C Johnston ICT Teacher
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Secure Computing Network
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Barracuda Web Application Firewall
Security Controls – What Works
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Payment Card Industry (PCI) Data Security Standard
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Norman SecureSurf Protect your users when surfing the Internet.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
ECE 578: COMPUTER NETWORK AND SECURITY
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
BUSINESS B1 Information Security.
70-411: Administering Windows Server 2012
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Insert presenter logo here on slide master. See hidden slide 2 for directions Deepak Gupta AirTight Networks Wireless Vulnerabilities in the Wild: View.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network security Product Group 2 McAfee Network Security Platform.
Wireless Intrusion Prevention System
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chapter 6: Securing the Local Area Network
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Secure Software Confidentiality Integrity Data Security Authentication
Business Risks of Insecure Networks
Wireless Network Security
Virtualization & Security real solutions
Wireless LAN Security 4.3 Wireless LAN Security.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Check Point Connectra NGX R60
Wireless Network Security
The MobileIron® Threat Detection difference:
In the attack index…what number is your Company?
LM 5. Wireless Network Security
Presentation transcript:

Wireless Network Security

Why wireless? Wifi, which is short for wireless fi … something, allows your computer to connect to the Internet using magic. -Motel 6 commercial

… but it comes at a price Wireless networks present security risks far above and beyond traditional wired networks Ad-hoc networks ARP poisoning Rogue access points Evil twins Wired/wireless bridging Compromised clients War driving Spectrum DoS Traffic cracking Man-in-the-middle IP leakage DHCP spoofing Grizzly bears Eavesdropping MAC spoofing Packet-based DoS

Agenda The Cisco Unified Wireless Networks Common wireless threats Cisco Security Agent (CSA) Cisco NAC Appliance Cisco Firewall Cisco IPS CS-MARS Common wireless threats How Cisco Wireless Security protects against them

Today’s wireless network

Cisco Unified Wireless Network The following five interconnected elements work together to deliver a unified enterprise-class wireless solution: Client devices Access points Wireless controllers Network management Mobility services

CSA – Cisco Security Agent Full featured agent-based endpoint protection Two components: Managed client - Cisco Security Agent Single point of configuration - Cisco Management Center

CSA - Purpose

CSA – Wireless Perspective

CSA – Combined Wireless Features General CSA features Zero-day virus protection Control of sensitive data Provide integrity checking before allowing full network access Policy management and activity reporting CSA Mobility features Able to block access to unauthorized or ad-hoc networks Can force VPN in unsecured environments Stop unauthorized wireless-to-wired network bridging

CSA – End User View 05/30/2009

Cisco Network Admission Control (NAC) Determines the users, their machines, and their roles Grant access to network based on level of security compliance Interrogation and remediation of noncompliant devices Audits for security compliance

NAC - Overview 05/30/2009

Cisco NAC Architecture

Cisco NAC Features Client identification Compliance auditing Access via Active Directory, Clean Access Agent, or even web form Compliance auditing Non-compliant or vulnerable devices through network scans or Clean Access Agent Policy enforcement Quarantine access and provide notification to users of vulnerabilities

Cisco Firewall (Placement Options) Source: Cisco, Deploying Firewalls Throughout Your Organization

Why Placing Firewalls in Multiple Network Segments? Provide the first line of defense in network security infrastructures Prevent access breaches at all key network junctures WLAN separation with firewall to limit access to sensitive data and protect from data loss Help organizations comply with the latest corporate and industry governance mandates Sarbanes-Oxley (SOX) Gramm-Leach-Bliley (GLB) Health Insurance Portability and Accountability Act (HIPAA) Payment Card Industry Data Security Standard (PCI DSS) -The rise of internal threats has come about by the emergence of new network perimeters that have formed inside the corporate LAN. 17

Cisco IPS Designed to accurately identify, classify and stop malicious traffic Worms, spyware, adware, network viruses which is achieved through detailed traffic inspection Collaboration of IPS & WLC simplifies and automates threat detection & mitigation

CS-MARS:Cisco Security Monitoring, Analysis and Reporting System Monitor the network Detect and correlate anomalies (providing visualization) Mitigate threats

Cross-Network Anomaly Detection and Correlation MARS is configured to obtain the configurations of other network devices. Devices send events to MARS via SNMP. Anomalies are detected and correlated across all devices. Configuration Notes SNMP community strings on MARS must match those on the devices. First add devices that detect attacks and false positives. Then add devices that can block an attack. Next add hosts such as critical database servers. Layer 3 devices can be discovered by CS-MARS. 20

Monitoring, Anomalies, & Mitigation Discover Layer 3 devices on network Entire network can be mapped Find MAC addresses, end-points, topology Monitors wired and wireless devices Unified monitoring provides complete picture Anomalies can be correlated Complete view of anomalies (e.g. host names, MAC addresses, IP addresses, ports, etc.) Mitigation responses triggered using rules Rules can be further customized to extend MARS

Agenda The Cisco Unified Wireless Networks Common wireless threats Cisco Security Agent (CSA) Cisco NAC Appliance Cisco Firewall Cisco IPS CS-MARS Common wireless threats How Cisco Wireless Security protects against them

Rogue Access Points Rogue Access Points refer to unauthorized access points setup in a corporate network Two varieties: Added for intentionally malicious behavior Added by an employee not following policy Either case needs to be prevented

Rogue Access Points - Protection Cisco Wireless Unified Network security can: Detect Rogue AP’s Determine if they are on the network Quarantine and report CS-MARS notification and reporting Locate rogue AP’s

Cisco Rogue AP Mapping

Group Quiz For each of the business challenges below, which component(s) of CUWN protect against them Mitigate network misuse, hacking and malware from WLAN clients by inspecting traffic flows Identify who is on the network and enforce granular policies to prevent exposure to viruses and “malware” Streamline user experience, consolidate accounting, and improve password management Standardize on wireless client connection policies while protecting them from suspect content and potential hackers Supporting and maintaining a diverse range of security products, correlating events and delivering concise reporting Offer secure, controlled access to network services for non employees and contractors IPS Cisco NAC NAC and CSA CSA CS-MARS NAC and firewall

Guest Wireless

Guest Wifi Benefits Network segmentation Policy management Guest traffic monitoring Customizable access portals

Conclusions Present unparalleled threats The Cisco Unified Wireless Network Solution provides the best defense against these threats

In-Band Modes When the NAC appliance is deployed in-band, all user traffic, both unauthenticated and authenticated, passes through the NAC appliance, which may be positioned logically or physically between end users and the network(s) being protected. When the NAC appliance is configured as a virtual gateway, it acts as a bridge between end users and the default gateway (router) for the client subnet being managed. When the NAC appliance is configured as a "real" IP gateway, it behaves like a router and forwards packets between its interfaces. 30

Compromised Clients Wifi Threat Security Concern CSA Feature Ad-hoc Connections Wide-open connections Unencrypted Unauthenticated Insecure Pre-defined ad-hoc policy Concurrent wired/wifi connection Contamenating secure wired environment Concurrent wired/wifi pre-defined policy Disable wifi traffic if wired detected Access to unsecured wifi May lack authentication / encryption Risk of traffic cracking, rogue network devices Location based policies Restrict allowed SSIDs Enforce stronger security policies