Download presentation
Presentation is loading. Please wait.
1
Wireless Network Security
by Joseph A. D’Imperio
2
Layers Passwords Antivirus RF Sensors Door Locks Network Policies
Standoff Distance Information
3
Authorization Alphabetical Password Proximity Card Biometric
Fingerprint Face Hand Iris Retina Voice
4
Implementation Service Set Identifier (SSID)
Wired Equivalency Protocol (WEP) Wi-Fi Protected Access Point (WPA) 802.11i MAC Address Filtering
5
Service Set Identifier (SSID)
Alphanumeric label that separates and identifies one wireless LAN from another. Do not set SSID to broadcast Do not set SSID value as something easy to guess
6
Wired Equivalency Protocol (WEP)
Provides Data encryption Casual attacker receives indecipherable messages More committed attacker can/will crack encryption code Static Encryption Key
7
Wi-Fi Protected Access Point (WPA)
Provides data encryption A motivated attacker who cracks the key will soon be forced to start over Dynamic encryption key
8
802.11i A.K.A. WPA2 Implies many of the same standards as WPA
Uses more advanced encryption standards Handles encryption keys more securely
9
MAC Address Filtering Restricts certain computers to network access
Not practical for large companies
10
Policies Position of wireless routers/access points
Change WEP key on a regular basis Only use access points that are capable of filtering MAC address Limit access time Limit the number of user addresses
11
Policies Secure your wireless router or access point administration interface Don't broadcast your SSID Enable WPA encryption instead of WEP Reduce your WLAN transmitter power Disable remote administration
12
Policies Create Backups Attack your own network Vulnerabilities
Weaknesses Backdoors What to expect if a real attack should occur
13
Example of a Wireless Network
14
Example of a Wireless Network
15
References (2007). WiFi manager distributed intrusion detection system. Retrieved October 7, manager/intrusion-protection- system.html?adwords31&gclid=CMGZv5-Jgo8CFQJsPAod_QKH2g Ciampa, M. (2005). Security Basics. In W. Pitkin. (Ed.) Security guide to network security fundamentals (pp ). Boston, Massachusetts: Course Technology. Karagiannis, K. (2003). Ten steps to secure a wireless network [Electronic Version]. Retrieved October 7, 2007, from Tomsho, G., Tittle, E., Johnson, D. (2007). Guide to networking essentials (W. Pitkin, Ed.). (pp. 51, 92-94, , ). Boston, Massachusetts: Course Technology.
16
The End Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.