Security in Wireless Networks 458 Security Offense Debate: Wireless Security by Cisco Group DoubleDeuce Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Securing The Network EDGE December 2010
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Networking Academy Advanced Technology Update June 19, 2008.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
WiFi VS Cellular “Bringing Secure Payment to the Point Of Service”
1 Copyright © 2005, Cisco Systems, Inc. All rights reserved. Applying Security Principles to Networking Applications Mark Enright Dec.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
All Rights Reserved © Alcatel-Lucent | Enterprise mobility | 2010 Laurent Bouchoucha October, 2010 Seamless mobility in a secure and controlled.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Secure Computing Network
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Fine Tuned Machines Wireless & Network Security Integration Solution Overview Offense – FTM March 6 th, 2010.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Wireless Network Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Documenting Network Design
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
1 Chapter Overview Wireless Technologies Wireless Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless LANs Configuring Cisco WLAN Clients. Cisco a/b/g WLAN Client Adapters a/b/g dual-band client adapters Supports all three current.
Chapter 6 of the Executive Guide manual Technology.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Securing your wireless LAN Paul DeBeasi VP Marketing
PRESENTATION ON WI-FI TECHNOLOGY
March 15, 2008 PM of FMC 1 Rich Watson Director of Technical Marketing DiVitas Networks – Mountain View March 15, 2008.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
The Complete Solution Wireless Services. Understanding your Wireless Requirements Infrastructure is Key Budget Coverage Capacity Management Security Integration.
Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
John Girard Bill Clark Gartner Webinar SSL VPN - A Lightweight Alternative To IPSEC These materials can be reproduced only with Gartner’s official approval.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Securing A Wireless Home Network. Simple home wired LAN.
Janis Buikauskis Joe Kubena Kyle Nelson Chris Schrader.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Wireless Access Point Product Overview
Overlapping eduroam networks operated by different organizations
Instructor Materials Chapter 6 Building a Home Network
Wireless IP products: GWN series
SUBMITTED BY DINEEJ A 28 S3 EC
Chapter 4: Wireless LANs
Wireless LAN Security 4.3 Wireless LAN Security.
Contact Center Security Strategies
Wireless Network Security
LM 5. Wireless Network Security
Presentation transcript:

Security in Wireless Networks 458 Security Offense Debate: Wireless Security by Cisco Group DoubleDeuce Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez May 30, 2009

Introduction  Cisco Centricity  Flaws with Article  Points Not Addressed  The Future/Best Practices

Cisco Centric Solution  Focus is on Cisco wireless solution  Advocates a need for network-wide security solution  Products Products and More Products –CUWN – Cisco Unified Wireless Network –CSA – Cisco Security Agent –Cisco NAC –Cisco Firewalls –Cisco IPS –CS-MARS – network security monitoring  Gartner group cautions little integration

Cisco Centric Solution - cont  Claims about Cisco Security product line –Scalable, Managable, Secure –Lowest Total Cost of Ownership –Self-defending, proactive, against most attacks  Does not compare other solutions

Flaws With Article  ‘Cisco… does not mean just putting more boxes on the network’? –Client Devices –Access Points –Wireless Controllers –Mobility Services –Network Mngmt  Campus Network Architecture ‘.. What does it do?’  Vs Branch Architecture? Click for 2 graphics

Flaws With Article - cont  Audience Is Unclear –Technical vs Executives – business case?  Oblivious to the fact that WEP is still dominant in most corporate environments –Assumes implementation of i encryption –Cisco slow to market with new solutions n

Points Not Addressed  Financial costs/risks not highlighted –Cost justification process unclear –Cisco expensive  Not enough content on methodology /process fix  Doesn’t bring home risks of rogue devices  No mention of signal controlling  No mention of custom virus infiltration and controls

Points Not Addressed - cont  Security advisories a full time job  Significant updating Single Vendor soln. for end to end security? Vendor Lock in an issue Missing functionality? Cisco low rated on EPP anti-virus

Best Practices  Recommended methodology for wireless protection –Security Policy – what to protect –Segment/Isolate networks critical data –Hire wireless pen testers to conduct tests against the network –Choose current methodologies over new devices  Security device installed and forgotten  Intruder sophistication recognized

Best Practices – cont. Wireless Planning  Guest access planning - use virtual LAN (VLAN) tunnels to route users outside the firewall  Use centrally controlled access points  Site Survey, Limit Coverage Areas  Turn off SSID, use unique anonymous names  Migrate to WPA2  Client Configurations Important –Personal firewalls –Turn off peer-to-peer/ad hoc networking. –Wireless and wired NICs should not be allowed to be active at the same time on a client

Questions Welcome  Useful Links  NIST Wireless Security Standards –  Network World Wireless Security Research –  InfoTech Research Group for Wireless Security –  Gartner Articles –Introduction to Wi-Fi Security Best Practices. John Girard, John Pescatore. ID Number: G –Magic Quadrant for Wireless LAN Infrastructure. Michael J. King, Tim Zimmerman. ID Number: G Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez