Download presentation
Presentation is loading. Please wait.
Published byJaquelin Tweedy Modified over 10 years ago
1
Wireless network security Lt. Robert Drmola, University of defence, Communication and information system department
2
Content Home and corporal networks comparison Data protection Protection methods WLAN standards comparison Conclusion
3
Home versus organizations networks WiFi – phenomenon of Czech republic (Internet providers policy) Urgency of protection also small office and home networks It has got advantages for hackers Big organizations usually uses better access methods
4
Reasons for wireless security Computer criminality Activities masking Industrial espionage Unauthorization access Connectivity to internet
5
Organizations data protection 38% scans company network for unauthorized access points 22% instruct employees about wireless network problems 57% set up network policy 33% without protection !!!!!
6
Company data protection Unauthorized (black) access point
7
Company data protection Ad-Hoc networks
8
Basic methods MAC filter activation SSID change Change of defaults parameters IP Admin password Default cryptography keys Argue out of 20% of attackers
9
Advanced methods WEP activation – Not so strong but better than nothing WPA, WPA2 activation Radius server activation Alternative for SOHO networks (WPA-PSK)
10
Corporal networks WLAN protection on commercial and organizations level User authentization: No authentization of devices but users – guard against stolen devices or device simulations
11
Corporal networks WLAN protection on commercial and organizations level System interdependence: protect against unauthorized access points. Not only the client to network but also the network to client authorization.
12
Corporal networks WLAN protection on commercial and organizations level Centralized management: All information about users, devices, access points are saved centrally. Easy for admins to change information but hard to attackers
13
Corporal networks WLAN protection on commercial and organizations level Dynamical encryption keys: Different keys for every session and for every device and user.
14
Security standards comparison Security level Open network WEP WPA-PSK WPA2-PSK WPA2-802.1x IPSec - VPN
15
Security standards for WLAN Authentization/EncryptionCorporal networksSOHO networks Open network---- / ----unsuitable WEPPractically none/WEPunsuitableVery bad WPA-PSKPSK/WEP-TKIPVery bad Very good (quality-price ratio) WPA2-PSKPSK/AES-CCMPBadIdeal solution WPA-802.1x802.1x/WEP-TKIPGood solution Unsuitable because of the price and hard implementation WPA2-802.1x802.1x/AES-CCMP Ideal solution for big networks Unsuitable because of the price and hard implementation
16
Idea and conclusion WLAN protection: Nowadays is possible to solve WLAN security can be personalized for every kind of running Solve encryption only in radio parts (IPSec, VPN)
17
Conclusion Security isn’t something what we can buy in box in our shop. It is unremitting fight between security experts and hackeres, which try to increase security level of our world. It requires persistent comparisons, tests and implementations. Unfortunately it can not be said: “Now - we protected our network and we can not solve this problem in future.”
18
Thank you for your attention Lt. Robert Drmola, University of defence, Communication and information systems department
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.