Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Insecurity.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
WIRELESS LAN SECURITY Using
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wi-Fi Technology By Marc Bailey. What is Wi-Fi? Wi-Fi or Wireless Fidelity is a wireless technolgy owned by the Wi-Fi Alliance (formed in 1999) Goal:
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Protocols WEP, WPA & WPA2.
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless Network Security
Presentation transcript:

Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates International

Center of Excellence Wireless and Information Technology 2 CEWIT 2003 Agenda Overview of Wireless Networks Security Issues Keys to a Secure Wireless Environment

Center of Excellence Wireless and Information Technology 3 CEWIT 2003 Wireless Networks Today WPAN (Wireless Personal Area Network) –Bluetooth WLAN (Wireless Local Area Network) –802.11b, a,g,i,… WWAN (Wireless Wide Area Network) –Through wireless operators using GPRS, CDMA, etc.

Center of Excellence Wireless and Information Technology 4 CEWIT 2003 Wireless Enterprises WWAN WLAN Existing Infrastructure

Center of Excellence Wireless and Information Technology 5 CEWIT 2003 Wireless LANs Wireless ethernet Wireless access point (AP) connected to a desktop or server or an existing network Mobile devices with compatible network cards are required

Center of Excellence Wireless and Information Technology 6 CEWIT 2003 IEEE WLAN Specifications Specification FrequencyThroughput Range (in meters) b2.4 GHz11 MB/sec50 – a/h5 GHz54 MB/sec~ g2.4 GHz54 MB/sec50 – 100

Center of Excellence Wireless and Information Technology 7 CEWIT 2003 Hotspots Public Access WLANs The ones you find at airports, hotels, and other public places On the rise, but still many issues to deal with –Billing –Roaming –Security

Center of Excellence Wireless and Information Technology 8 CEWIT 2003 WWANs Service offered by wireless operators like Vodafone, NTT DoCoMo, Verizon Wireless, Cingular and others Data transfer over cellular networks Cover global geography Use technologies like GPRS, CDMA, and others

Center of Excellence Wireless and Information Technology 9 CEWIT 2003 What’s Available Today Most infrastructure is either 2G or 2.5G, not quite 3G yet 3G promises throughputs of: –~384 Kbps for semi-stationary devices –~128 Kbps when in a car –~ 2Mbps in fixed applications

Center of Excellence Wireless and Information Technology 10 CEWIT 2003 The #1 Barrier Security is the #1 issue for enterprises deploying wireless environments

Center of Excellence Wireless and Information Technology 11 CEWIT 2003 Network Security Integrate with existing infrastructure Rogue access points Vulnerable WLANs –Intrusions Sniffing Spoofing Session hijacking Man in the Middle –Obstructions Jamming Denial-of-service –War-driving, war-chalking

Center of Excellence Wireless and Information Technology 12 CEWIT 2003 Too Much Soup & Chips Build-it-yourself Wi-Fi antenna amplifiers a.k.a. “Cantennas” Pringles can (5 miles) Campbell’s Soup can (7 miles) Instructions available on the Web

Center of Excellence Wireless and Information Technology 13 CEWIT 2003 Nothing Better To Do?

Center of Excellence Wireless and Information Technology 14 CEWIT 2003 WLAN Security WEP (Wired Equivalent Privacy) –Provides encryption based on RC-4 cipher WPA (Wi-Fi Protected Access) –Uses dynamic keys and advanced encryption 802.1x –Provides authentication using EAP (Extensible Authentication Protocol) i –Advanced encryption and authentication

Center of Excellence Wireless and Information Technology 15 CEWIT 2003 Wireless Encryption (WEP) RC4 40 Bits 0.7 Seconds GSMA5 56 Bits (NATO) 12 Hours Time To CrackKey Length AlgorithmSystem 40 Bits (friendly) 0.7 Seconds 0 Bits (world) 0 CDMA One 96 Bits (US) 1.5 Billion Yrs 32 Bits (world) 2.6 milliseconds Oryx UMTSKasumi 128 Bits 6.5 million trillion years (TKIP Or WPA) RC4/Kerberos 128 Bits 3 Seconds Example Open Source Utilities: WEPCrack (Perl), Airsnort (Linux)

Center of Excellence Wireless and Information Technology 16 CEWIT 2003 Device Security Protection of mobile information Configuration control Virus attacks Recovering from the effects of lost and stolen devices

Center of Excellence Wireless and Information Technology 17 CEWIT 2003 User Security Integrate mobile users into existing security policies Context-based access control Identity management Authentication Provisioning Location-based security

Center of Excellence Wireless and Information Technology 18 CEWIT 2003 Security Best Practices Get your wired security in order first Take an enterprise-wide perspective Define clear goals and security policies for your wireless environment –Networks –Devices –Users Identify and audit the wireless users Research the technology thoroughly and choose what best meets your business objectives Partner with trusted business and technology advisors

Center of Excellence Wireless and Information Technology 19 CEWIT 2003 Basic WLAN security Use WEP or AES for encryption Maintain an updated MAC list Do not broadcast the SSID If you can, don’t use DHCP for wireless devices Use WPA so that the keys are dynamically rotated Use 802.1x to authenticate your users Require WLAN users to log in through VPN

Center of Excellence Wireless and Information Technology 20 CEWIT 2003 Take No Chances

Center of Excellence Wireless and Information Technology 21 CEWIT 2003 CA’s Wireless Solutions eTrust ™ Antivirus eTrust ™ Admin eTrust ™ Intrusion Detection eTrust ™ Web Access Control eTrust ™ Security Command Center CleverPath ™ Portal BrightStor ® Mobile Backup ManageDeliverSecure Storage Unicenter ® Wireless Network Management Option Unicenter ® Asset Management Unicenter ® Software Delivery Unicenter ® ServicePlus Service Desk

Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates International