Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understand Wireless Security LESSON 1.4 98-367 Security Fundamentals.

Similar presentations


Presentation on theme: "Understand Wireless Security LESSON 1.4 98-367 Security Fundamentals."— Presentation transcript:

1 Understand Wireless Security LESSON 1.4 98-367 Security Fundamentals

2 LESSON 1.4 Lesson Overview How do you secure a wireless network? In this lesson, you will learn:  Concepts related to securing a wireless network  Problems that can arise without security

3 98-367 Security Fundamentals LESSON 1.4 Anticipatory Set  Open the Network Places on your computer and record the properties of each connection.

4 98-367 Security Fundamentals LESSON 1.4 Guiding Questions 1. What is the status of each connection? 2. Is the Windows ® firewall turned on? Off? 3. What processes run during a “repair”?

5 98-367 Security Fundamentals LESSON 1.4 Wireless Technologies Wired Equivalent Privacy (WEP)  The WEP encryption standard has been compromised and is considered unsafe.  WEP is an encryption algorithm system included as part of the 802.11 standard, developed by the Institute of Electrical and Electronics Engineers as a security measure to protect wireless LANs from casual eavesdropping. WEP uses a shared secret key to encrypt packets before transmission between wireless LAN devices and monitors packets in transit to detect attempts at modification. WEP offers both 40-bit and 128-bit hardware-based encryption options.

6 98-367 Security Fundamentals LESSON 1.4 Wireless Technologies – WiFi  The technology is designed to work with existing Wi-Fi products that have been enabled with WEP (i.e., as a software upgrade to existing hardware), but the technology includes two improvements over WEP:software  Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with.  User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network.

7 98-367 Security Fundamentals LESSON 1.4 Wireless Technologies Service Set Identifier (SSID)  A 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the BSS (the communicating stations, or nodes, on a wireless LAN).  The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID.  Because an SSID can be sniffed in plain text from a packet it does not supply any security to the network. An SSID is also referred to as a network name because essentially it is a name that identifies a wireless network.

8 98-367 Security Fundamentals LESSON 1.4 Class Activity Can you find and identify a rogue (unauthorized) Wi-Fi access point? What tools would you use? Recommend?

9 98-367 Security Fundamentals LESSON 1.4 Lesson Review  Who can change the level of encryption on a wireless access point?  What is the highest level of wireless security?  What is the advantage of changing the SSID?


Download ppt "Understand Wireless Security LESSON 1.4 98-367 Security Fundamentals."

Similar presentations


Ads by Google