PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.

Slides:



Advertisements
Similar presentations
Anatomy of an Wi-Fi Enterprise Wireless LAN Chris De Herrera Pacific Crest Bank Chief Information Officer Webmaster, Tablet PC Talk, CEWindows.NET.
Advertisements

Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
Chaper 11-Wireless LANS Wireless LAN Concepts Deploying WLANs
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Northern Arizona University Wi-Fi 2005 Flagstaff Campus Wireless Plan 4/11/2005.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless Networking (WLAN) Reina Trujillo Nathan Ekenberg.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
SIR Area 2 Computers & Technology Dean Steichen March 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless LANs Presented by: Jerome Thompson Mei-Lun Huang Liu-Yin Hu Kai-Wing Sum.
Securing a Wireless Network
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
ECE 578: COMPUTER NETWORK AND SECURITY
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Doc.: IEEE ai Submission Paul Lambert, Marvell Security Review and Recommendations for IEEE802.11ai Fast Initial Link Setup Author:
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless Networking & Security Greg Stabler Spencer Smith.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Behind Enemy Lines Administrative Web Application Attacks Rafael Dominguez Vega 12 th of March 2009.
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Security fundamentals Topic 10 Securing the network perimeter.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CSE 5/7349 – April 5 th 2006 Wireless Networking.
CPT 123 Internet Skills Class Notes Internet Security Session B.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
MOHAMAD NURHAKIM BIN ZAILAN 2TSK1. Wireless Gateways The wireless gateway is a device that allows a computer and other Internet-enabled devices.
Wireless security. Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING.
Security fundamentals
Wireless Networks: There Be Dragons!
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Network Security
Technology - wireless Describe equipment and technologies operating in the radio frequency (RF) spectrum between 3 Hz and 300 GHz. Examples of wireless.
Wireless Local Area Network (WLAN)
Presented by: Jeffrey D. Bombell, American Computer Technologies
Security of a Local Area Network
Anatomy of a Wireless LAN – Part I
Digital Pacman: Firewall Edition
802.11b Wireless Network Security
September 2011 April 2009 doc.: IEEE /xxxxr0
Firewalls Routers, Switches, Hubs VPNs
WLAN Security Antti Miettinen.
By Markus Kriechhammer
LM 5. Wireless Network Security
Presentation transcript:

PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos

PwC 2 Agenda The Future Of Wireless Security Concerns Risk Management Approach Key Design and development initiatives Live Demonstration Session 1 Session 2 Intro

PwC 3 Future of Wireless Technology Most hardware based on b protocol (802.11g fast replacing “b”), but there are others (eg a) Uses Direct Sequence Spread Spectrum (DSSS) modulation at unlicensed 2.4 GHz band (i.e., same band as cordless phones, microwaves, other unlicensed use) Ethernet-to-wireless bridge (i.e., transmits all protocols, not just IP) Speed between 1 and 11 Mbps based on distance (“g” up to 54 Mbps) Features Plug-and-play DHCP client (LAN port) DHCP server (wireless port) Support for most operating systems and form factors Inexpensive and visually appealing (it is OK to have one at home) Pervasive (Dick Smith / Harvey Norman sell them) Convergence of VoIP and Wireless

PwC 4 Some thoughts on wireless Tagging (RFID) Value proposition E-tags require no line of sight to be interrogated. They can be read through nonmetallic substances, paint, grease or other obscuring materials. They do not require surfaces with smooth flat contours. Can support a longer read range than bar codes Can store more data than bar codes and data can be updated Commercial viability Already significant RFID usage in healthcare in US and Europe. Used to tag anything from patients to equipment to medicines. Passive RFID tags are forecast to exceed 800 million in 2004 (Gartner T ) Privacy considerations Small size makes RFID tags difficult to see May be used to monitor, track, and control individuals without their consent

PwC 5 Security Concerns Corporate Unauthorised APs with default settings on trusted part of the network Anybody can join Open networks Wireless sniffing (very easy) and weak WEP encryption All traditional hacker attacks work Business travelers and home users Joining Open networks (possibly involuntary) while connected over VPN Lack of personal firewalls or IDS (no longer behind corporate firewall) Weak default settings for home network (no WEP) Insecure computers due to OS (e.g., Windows 98) or physical access (kids can use computer and add hardware and software) Possible regulatory violations related to Privacy and Security Availability and Quality-of-Service (2.4 GHz band open to public) Network management headaches due to DHCP and NAT

PwC 6 War Driving War Driving is the term attached to finding rogue AP’s. All that is needed is a network card, laptop, and an antenna. Default and unprotected networks are often discovered. One War Driving excursion through Sydney found 500+ networks, with less then half secured. Do you know how many access points are on your network ?

PwC 7 Risk Management Approach Threats Vulnerabilities Likelihood Impact Risk X X = =

PwC 8 Key Design / Deployment Initiatives Education Home users Business travelers Design and deployment Policies and procedures must address technology Determine application requirements Review the size, location, and staffing level of the area to be covered Physical access – locate APs away from windows, outside walls, etc. Enforce higher network speed – higher speed means shorter distance Treat wireless LANs as untrusted and use traditional Internet technologies to secure Network segmentation Firewalls and Intrusion Detection, including for laptops VPN for sensitive applications Verify use of secure encryption (WEP, WPA, WPA-PSK, WPA2, i) Use of a

PwC 9 Key Design / Deployment Initiatives Enforcement and audit Identify all networks on all channels; investigate all unauthorized Access Points Verify Open vs. Closed network Verify use of secure encryption

PwC Tools Net Stumbler Software that can find and identify wireless access points and level of encryption in use. Commonly used in War Driving to discover unauthorized access points Airsnort Software that can break WEP traffic while sniffing the network. The WEP algorithm was cracked by Rice intern at AT&T

PwC 11 Network Stumbler – Live Demo

PwC 12 Summary - Top 5 Mitigation Steps 1.Balance risk against cost of mitigation 2.Policies & Procedures must address technology 3.Determine business / application requirements 4.Treat wireless LAN’s as untrusted 5.Adopt the defense-in-depth principle