Presentation is loading. Please wait.

Presentation is loading. Please wait.

Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?

Similar presentations


Presentation on theme: "Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?"— Presentation transcript:

1 Tightening Wireless Networks By Andrew Cohen

2 Question Why more and more businesses aren’t converting their wired networks into wireless networks?

3 The truth is that a wireless network “poses a much greater threat because the attacker has easy access to the transport medium. In wired networking, an attacker usually must penetrate some physical security perimeter to gain network access. But wireless networking’s broadcast nature makes traditional link-layer attacks readily available to anyone wishing to create mischief” (Arbaugh).

4 WiFi network A WiFi network, sometimes called Wireless Local Network (WLAN) consists of two main components; clients and access points – An access point is like a door to the wireless network. – A client is you… It utilizes radio waves for communication

5 Goals of Wireless Security Confidentiality Integrity Availability

6 A modern wireless router normally comes with several security features; Service Set Identifier, Wired Equivalent Privacy (WEP), and MAC Address Filters.

7 Service Set Identifier (SSID) It broadcasts the name of its wireless router to others who are searching for access points

8 Wired Equivalent Privacy (WEP) A technique dubbed RC4 stream cipher applies the 40 or 104 bit symmetric key to the data

9 MAC Address Filters hexadecimal value assigned to a piece of hardware

10 Secure Enough? Service Set Identifier Wired Equivalent Privacy (WEP) MAC Address Filters.

11 What do you need for hacking? cheap computer with a wireless LAN card to intercept the signal.

12 Hack SSID? Stumbling – actively detect networks Sniffing – capturing, all the traffic moving through the air

13 Hack MAC? ARP Spoofing (or ARP Poisoning) – It only requires a simple change in the operating system’s registry.

14 Hack WEP? WEP uses RC4 which takes short groups of data and expands it into an incredibly long random bunch of characters. Initialization Vector (IV) – only 24 bits long

15 How to improve WiFi security? Change default username and password Turn off SSID Enable MAC Filtering Turn on WEP Limit the # of clients (through DHCP) Change the default ip address (192.168.0.1)

16 Virtual Private Network (VPN) Intrusion Detection System (IDS) Temporal Key Integrity Protocol (TKIP) – a new encryption scheme WiFi Protected Access (WPA) – Wireless protocol Strong Password (over 20 characters) How to improve WiFi security?

17 802.11i protocol Incorporate all the advantages of WEP, WPA, AES, TKIP, and a few other encryption schemes.


Download ppt "Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?"

Similar presentations


Ads by Google