Wireless Network Security Presented by: Prabhakaran Theertharaman.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security+ Guide to Network Security Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless Networking 102.
CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Solving the Security Risks of WLAN Tuukka Karvonen
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
WAP vs. WEP Prof. Carlos Rodríguez Sánchez. WAP WAP Wireless Application Protocol a secure specification that allows users to access information instantly.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Understand Wireless Security LESSON Security Fundamentals.
Chapter 5 LANs and WLANs.
TERMINOLOGY Define: WPAN
Wireless Networks: There Be Dragons!
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
How To Set Up A Wireless Network
Technology, Issues, and Solutions by David Clark
PREPARED BY: RIDDHI PATEL (09CE085)
WLAN Security Antti Miettinen.
LM 5. Wireless Network Security
Presentation transcript:

Wireless Network Security Presented by: Prabhakaran Theertharaman

Presentation Plan  An overview of wireless technology.  Benefits, Security risk, Mitigation for WLAN technology WLAN technology Bluetooth ad hoc network technologyBluetooth ad hoc network technology Handheld wireless devicesHandheld wireless devices

Wireless Technology  Enables one or more devices to communicate without physical connections  Does not require network or peripheral cabling   Receive and transmit information using electromagnetic (EM) waves.  Ranges from Radio Frequency [RF] to Infrared frequency [IR] for transmitting data   Extends from 9 kilohertz (kHz) to thousands of gigahertz (GHz)

Wireless Networks  Wireless Wide Area Networks (WWAN) Wider CoverageWider Coverage Example:Example:  2G Cellular  Cellular Digital Packet Data (CDPD)  Global System for Mobile Communications (GSM)  Mobitex  Wireless Local Area Networks (WLAN) Smaller NetworksSmaller Networks Example:Example:   HiperLAN  Wireless Personal Area Network (WPAN) Ad hoc Networks*Ad hoc Networks* Example:Example:  Bluetooth  Infrared (IR)

Threats and vulnerabilities of wireless systems  Vulnerabilities that exist in a wired network apply to wireless technologies too.  Malicious entities may gain unauthorized accessgain unauthorized access intercept and discloseintercept and disclose Denial of service (DoS)Denial of service (DoS) MasqueradeMasquerade deploy unauthorized equipmentdeploy unauthorized equipment use un-trusted wireless network servicesuse un-trusted wireless network services  Sensitive data may be corrupted during improper synchronization.  Handheld devices are easily stolen and can reveal sensitive information

Wireless attacks Attacks Passive EavesdroppingTraffic Analysis Active MasqueradeReplay Message Modification Denial of Service

General Wireless Security Requirements  Authenticity - A third party must be able to verify that the content of a message has not been changed in transit.  Non-Repudiation - The origin or the receipt of a specific message must be verifiable by a third party.  Accountability - The actions of an entity must be traceable uniquely to that entity.

Wireless Local Area Network a.k.a., WiFi, WLAN

Wireless LAN - Benefits  User Mobility  Rapid Installation  Flexibility  Scalability

Security features of WiFi  Authentication Only authorized persons allowed to gain access to my network.  Confidentiality Intended to prevent information compromise from casual eavesdropping (passive attack)  Integrity Ensures that messages are not modified in transit between the wireless clients and the access point in an active attack.

WEP  WLANs security services are provided by Wired Equivalent Privacy (WEP) protocol.  WEP protects link-level data during wireless transmission between clients and access points.  WEP does not provide end-to-end security (just the wireless portion of the network)

Risk Mitigation  Management Countermeasures  Operational Countermeasures Physical securityPhysical security  Technical Countermeasures Software Solutions Hardware Solutions

Technical Countermeasures  Software Solutions 1. Access Point Configuration Updating default passwords Establishing proper encryption settings Controlling the reset function Using MAC ACL functionality Changing the SSID Maximize the Beacon Interval Disable broadcast SSID feature Changing default cryptographic keys Using SNMP Changing default channel Using DHCP – Dynamic Host Control Protocol

Software Solutions Access Point Configuration 2. Software Patches and Upgrades 3. Authentication 4. Personal Firewalls 5. Intrusion Detection System (IDS) 6. Encryption 7. Security Assessments

Hardware Solutions Smart CardsSmart Cards Virtual Private NetworksVirtual Private Networks Public Key Infrastructure (PKI)Public Key Infrastructure (PKI) BiometricsBiometrics

Wireless PAN – Bluetooth Technology

Bluetooth Technology Bluetooth is a standard that will Eliminate wires and cables between both stationary and mobile devicesEliminate wires and cables between both stationary and mobile devices Facilitate both data and voice communicationsFacilitate both data and voice communications Offer the possibility of ad hoc networks and deliver synchronicity between personal devicesOffer the possibility of ad hoc networks and deliver synchronicity between personal devices

Benefits  Cable replacement  Ease of file sharing  Wireless synchronization  Automated wireless applications  Internet connectivity

Bluetooth Security modes Security Modes Security Mode 1 No security Security Mode 2 Service Level Security Flexible / Policy based AuthenticationConfidentialityAuthorization Security Mode 3 Link Level Security Fixed AuthenticationConfidentiality

Security Requirements for Risks  Loss of Confidentiality  Loss of Integrity  Loss of Availability

Risk Mitigation  Software Solutions - Bluetooth PIN - Bluetooth PIN  Hardware Solutions - Device Address - Device Address - Frequency-Hopping Schemes - Frequency-Hopping Schemes - Trusted Third Party (TTP) Authentication - Trusted Third Party (TTP) Authentication

Wireless Hand Held Devices Personal Digital Assistants (PDA) & Smart Phones

Security Requirements  Loss of Confidentiality  Loss of Integrity  Loss of Availability

Risk Mitigation  Authentication  Encryption  Antivirus Software  PKI  VPN and Firewalls  Enterprise Solutions

Questions ?

Thank You