Guerilla Warfare Balakumar Balasubramanian. Security Issues In Wireless/Mobile Networking.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Ethical Hacking Pratheeba Murugesan. HACKER AENDA  What is Ethical Hacking?  Who are ethical hackers?  Every Website-A Target  Get out of jail free.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Access Control and Site Security (Part 2) (Tuesday, January 22, 2008) © Abdou Illia – Spring 2008.
By: Alena Newcomb.  What is a WI-FI hotspot?  Wireless Local Area Network location that provides broadband Internet access.  Use of laptops, PDA, or.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Access Control and Site Security (Part 2) (January 28, 2015) © Abdou Illia – Spring 2015.
Securing Information Systems
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
PRESENTATION ON WI-FI TECHNOLOGY
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Lecture 24 Wireless Network Security
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Texas Technology Forum The Future of Mobile Technology Trends and Issues July 16, 2009.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Networking Network Classification, by there: 3 Security And Communications software.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Networks The Big Picture. Three Great Leaps of Civilization.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
ICT Unit 4: Network and the effects of using them
Wireless Networks Dave Abbott.
CompTIA Security+ Study Guide (SY0-401)
Providing Teleworker Services
Ethical Hacking.
Presentation transcript:

Guerilla Warfare Balakumar Balasubramanian

Security Issues In Wireless/Mobile Networking

AENDA  Faces of wireless  Who are Cyber Guerillas  Who are at Risk…What do they do  Pitfalls  Combating Techniques  Personal Observations

Many Faces of Wireless  Wireless Personal Area Networks (WPANs) use very short-range wireless technology to replace cables connecting PCs with peripherals, phones with headsets, etc.  Wireless Local Area Networks (WLANs) use short-range wireless to reach at least 300 feet, at speeds up to 11 Mbps (IEEE b) and 54 Mbps (802.11a/g). WLANs connect computers-desktops, laptops, PDAs and Pocket PC-enabled phones-to each other and to adjacent networks via wireless access points or gateways.

……  Wireless Metropolitan Area Networks (WMANs) use very high-speed wireless for site-to-site connections-for example, a five-mile point-to-point uplink from a subscriber's office to a service provider's network access center. WMAN technologies include LMDS, MMDS, and IEEE fixed broadband wireless.  Wireless Wide Area Networks (WWANs) are long-range radio networks that deliver mobile voice and data to subscriber devices like cellphones, pagers, smart phones, voice-enabled PDAs and Blackberries.

Cyber Guerillas  Cyber Guerillas are the newest breed of hackers. They love to hunt and sniff the air for signals emitted from the Wireless Handheld devices that you use to connect to the WLAN

Who are cyber guerillas?  Wireless Network hackers  Deny or destroy wireless services for legitimate user.  They search for signals in the spectrums and uses hacking tools to decrypt the transmission.  More dangerous than regular hacker.

Who are at Risk?  A Business Traveler closing a multi million dollar deal  Military Personal receiving military alerts  Hotspot Users  Any body using a wireless device.

What do they do?  Cyber Guerillas eavesdrop, grab passwords, valid station identifiers and network address( Particularly default ones the system administrator forgot to change).  Steal internet bandwidth, user your network as a spring board to attack others  Use sniffing tool to search for signals from wireless mobile devices.  After successfully intercepting the signals, they divert those signal to high speed connection and then target wireless vulnerabilities.

Our Pitfalls  Frequency Channel Overlapping - The space between channel can be so narrow that one frequency might overlap with another.  Wi-Fi Implementation incompatibility  Hotspots in public places.  Unauthorized workstations.  System defaults that haven’t been changed.  Immature or inadequate wireless standards.

Being Prepared  What can an intruder see on the target systems?  What can an intruder do with that information?  Does anyone at the target notice the intruder's attempts or successes? 1. What are you trying to protect? 2. Who are you trying to protect against? 3. How much time, effort, and money are you willing to expend to obtain adequate protection?

Prevention is Better  If you don't know what you're defending and why, your security measures are just shots in the dark.  Who needs access to what and when?  Once assets have been identified, enumerate threats and quantify risks. Security is always a balancing act, weighing risk against cost.  the trick then is to monitor your network's health to keep it safe.

Preparing for Combat  Authentication  VPN  Firewalls  Cryptography  Biometrics

Authentication  Authenticate a message senders identity.  PKI-Public Key Infrastructure Mechanism provides a set of technologies that relies on certificates.  Certificates are messages attachments,issued by certificate authority that authenticate a senders identity and provide encryption keys.  Public key cryptography – use a single algorithm to create a public and private key.  Challenges – Wireless devices have a low throughput and computational power.  WPKI – Wireless PKI  Smart cards inserted into a device – mounted reader.

IEEE Security  The standard's security is composed of authentication and encryption.  When shared-key authentication is enabled, stations can associate with the AP only if they have a 40- or 128-bit key known to both parties.  Only stations that possess the shared key can join the WLAN  Authentication of individual stations not possible with  i standard's Temporal Key Integrity Protocol (TKIP) provides for more robust encryption.

Virtual Private Network  Provide security by creating an encrypted tunnel through public internet.  Reduces cost by eliminating the need for companies to build secure private networks.  Once a handheld device’s VPN client obtains an IP address by connecting to the internet, it can authenticate itself to company’s VPN server.

VPN Deployment

Firewalls / Biometrics  A WAP gateway can serve as the single point of entry for an enterprise’s wireless system.  Companies can secure and monitor the gateway as they do a traditional firewall.  Use of a person’s unique physical characteristics. Finger Prints,voice patterns, facial geometry or retinal images.  Biometrics are too costly for small wireless devices.

Personal Observation  Wireless networks are widely used.  SEPTA – Market East Station  PWD – Water Treatment plant  Security Industry

Suggestions?