March 2003 Slide 1 802.11 Security (Again, Sorry) Darrin Miller

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Encrypting Wireless Data with VPN Techniques
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
© HiperLAN2 Global Forum HiperLAN2 Global Forum (H2GF) Martin Johnsson, Chairman February 25, 2000.
© 2003 Bluesocket, Inc. Proprietary and Confidential. Do not copy. Security, Management & Mobility of Wireless Networks (WLANs) Issues Approaches Solutions.
CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
Implementing Security for Wireless Networks Presenter Name Job Title Company.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj SupervisorProfessor.
Wireless Security without a VPN! Stirling Goetz, Microsoft Consulting Services.
802.1x EAP Authentication Protocols
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Internet Protocol Security (IPSec)
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
By: Christopher Henderson.  What is VoIP?  How is it being used?  VoIP’s main Security Threats.  Availability of Service  Integrity of Service 
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Public Key Infrastructure Ammar Hasayen ….
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Lessons Learned in Smart Grid Cyber Security
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
© 2004 Bluesocket, Inc. Secure Mobility ™ Wireless Security: Issues and Solutions Mike Brockney Bluesocket
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Perceptions of Wi-Fi Security Requirements: A Stratified View Merrill Warkentin Xin (“Robert”) Luo Mississippi State University.
SECURING Presented by: Digvijay Singh Dudi Graduate Student Old Dominion University.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Securing your wireless LAN Paul DeBeasi VP Marketing
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Randy Kendzior, Dell, Inc. September 24, 2004 Wireless Technology Discussion Massachusetts Digital Government Summit.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Mobile & Wireless Communication-2 Subject Code : 9471 Semester :7th Department.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless Technology x: Wi-Fi Standards - Cutting Through The Confusion Rob Karnbach Wireless ME May 2003.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Wireless security Wi–Fi (802.11) Security
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Federated Wireless Network Authentication Kevin Miller Duke University Internet2 Joint Techs Salt Lake City February, 2005.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
Extensible Authentication Protocol
Virtual Private Network (VPN)
Providing Teleworker Services
Preparing Tips For CompTIA SY0-501 Final Exam | CompTIA SY0-501 Dumps PDF Dumps4download
Virtual Private Network (VPN)
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Providing Teleworker Services
Providing Teleworker Services
LM 5. Wireless Network Security
Providing Teleworker Services
Presentation transcript:

March 2003 Slide Security (Again, Sorry) Darrin Miller

March 2003 Slide 2 Agenda Today Tomorrow Public WLANs Private WLANs Future

March 2003 Slide 3 Today Proprietary Implementations –Variety of implementations that thwart the large threats to Wireless LANs (WLANs) WiFi Protected Access (WPA) –Imminent, and again mitigates the large threats to WLANs Tunneling overlays (SSL, SSH, IPsec)

March 2003 Slide 4 Tomorrow – Task Group i (TGi) Pros –Stronger Encryption (AES) –More complete features and mitigation of threats authenticated management frames Secure ad-hoc networking Secure roaming Challenges –Must evaluate the entire system for security –Relies on other entities for security (IETF) –How soon will TGi be finished and how soon will vendors produce interoperable products –EAP acronym soup (EAP-TLS, PEAP, EAP-TTLS)

March 2003 Slide 5 Public WLANs Today –Authentication Mandatory –Typically No Confidentiality –Limited Roaming –Dedicated Access Points Tomorrow –Legacy Device Support –Roaming Mandatory –Fraud Protection –Confidentiality Desired –Shared Use Access Points

March 2003 Slide 6 Private WLANs Today –Authentication Mandatory –Confidentiality Mandatory –Legacy Device Support Tomorrow –QOS Support Mandatory (VoIP) –Secure Roaming Mandatory –Legacy Device Support –Easier Deployment –Easier Management

March 2003 Slide 7 Future - Devices in Motion Handoff of service between WLAN and Wireless WAN –Authentication assurance –Confidentiality assurance –Consistency across standards bodies (?) Public Services Based Network –Corporate Application Access User Based Public Service –Personal Use User Based Private to Public Service –How do we consistently authenticate the user to the both services –Corporate Security Policy compliance. Is it OK to be connected to two networks at once. Will the end user or corporation even know?

March 2003 Slide 8 Feedback?