Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Network Security Presented by: Prabhakaran Theertharaman.

Similar presentations


Presentation on theme: "Wireless Network Security Presented by: Prabhakaran Theertharaman."— Presentation transcript:

1 Wireless Network Security Presented by: Prabhakaran Theertharaman

2 Presentation Plan  An overview of wireless technology.  Benefits, Security risk, Mitigation for 802.11 WLAN technology802.11 WLAN technology Bluetooth ad hoc network technologyBluetooth ad hoc network technology Handheld wireless devicesHandheld wireless devices

3 Wireless Technology  Enables one or more devices to communicate without physical connections  Does not require network or peripheral cabling   Receive and transmit information using electromagnetic (EM) waves.  Ranges from Radio Frequency [RF] to Infrared frequency [IR] for transmitting data   Extends from 9 kilohertz (kHz) to thousands of gigahertz (GHz)

4 Wireless Networks  Wireless Wide Area Networks (WWAN) Wider CoverageWider Coverage Example:Example:  2G Cellular  Cellular Digital Packet Data (CDPD)  Global System for Mobile Communications (GSM)  Mobitex  Wireless Local Area Networks (WLAN) Smaller NetworksSmaller Networks Example:Example:  802.11  HiperLAN  Wireless Personal Area Network (WPAN) Ad hoc Networks*Ad hoc Networks* Example:Example:  Bluetooth  Infrared (IR)

5 Threats and vulnerabilities of wireless systems  Vulnerabilities that exist in a wired network apply to wireless technologies too.  Malicious entities may gain unauthorized accessgain unauthorized access intercept and discloseintercept and disclose Denial of service (DoS)Denial of service (DoS) MasqueradeMasquerade deploy unauthorized equipmentdeploy unauthorized equipment use un-trusted wireless network servicesuse un-trusted wireless network services  Sensitive data may be corrupted during improper synchronization.  Handheld devices are easily stolen and can reveal sensitive information

6 Wireless attacks Attacks Passive EavesdroppingTraffic Analysis Active MasqueradeReplay Message Modification Denial of Service

7 General Wireless Security Requirements  Authenticity - A third party must be able to verify that the content of a message has not been changed in transit.  Non-Repudiation - The origin or the receipt of a specific message must be verifiable by a third party.  Accountability - The actions of an entity must be traceable uniquely to that entity.

8 Wireless Local Area Network a.k.a., WiFi, 802.11 WLAN

9 Wireless LAN - Benefits  User Mobility  Rapid Installation  Flexibility  Scalability

10 Security features of WiFi  Authentication Only authorized persons allowed to gain access to my network.  Confidentiality Intended to prevent information compromise from casual eavesdropping (passive attack)  Integrity Ensures that messages are not modified in transit between the wireless clients and the access point in an active attack.

11 WEP  WLANs security services are provided by Wired Equivalent Privacy (WEP) protocol.  WEP protects link-level data during wireless transmission between clients and access points.  WEP does not provide end-to-end security (just the wireless portion of the network)

12 Risk Mitigation  Management Countermeasures  Operational Countermeasures Physical securityPhysical security  Technical Countermeasures Software Solutions Hardware Solutions

13 Technical Countermeasures  Software Solutions 1. Access Point Configuration Updating default passwords Establishing proper encryption settings Controlling the reset function Using MAC ACL functionality Changing the SSID Maximize the Beacon Interval Disable broadcast SSID feature Changing default cryptographic keys Using SNMP Changing default channel Using DHCP – Dynamic Host Control Protocol

14 Software Solutions 1. 1. Access Point Configuration 2. Software Patches and Upgrades 3. Authentication 4. Personal Firewalls 5. Intrusion Detection System (IDS) 6. Encryption 7. Security Assessments

15 Hardware Solutions Smart CardsSmart Cards Virtual Private NetworksVirtual Private Networks Public Key Infrastructure (PKI)Public Key Infrastructure (PKI) BiometricsBiometrics

16 Wireless PAN – Bluetooth Technology

17 Bluetooth Technology Bluetooth is a standard that will Eliminate wires and cables between both stationary and mobile devicesEliminate wires and cables between both stationary and mobile devices Facilitate both data and voice communicationsFacilitate both data and voice communications Offer the possibility of ad hoc networks and deliver synchronicity between personal devicesOffer the possibility of ad hoc networks and deliver synchronicity between personal devices

18 Benefits  Cable replacement  Ease of file sharing  Wireless synchronization  Automated wireless applications  Internet connectivity

19 Bluetooth Security modes Security Modes Security Mode 1 No security Security Mode 2 Service Level Security Flexible / Policy based AuthenticationConfidentialityAuthorization Security Mode 3 Link Level Security Fixed AuthenticationConfidentiality

20 Security Requirements for Risks  Loss of Confidentiality  Loss of Integrity  Loss of Availability

21 Risk Mitigation  Software Solutions - Bluetooth PIN - Bluetooth PIN  Hardware Solutions - Device Address - Device Address - Frequency-Hopping Schemes - Frequency-Hopping Schemes - Trusted Third Party (TTP) Authentication - Trusted Third Party (TTP) Authentication

22 Wireless Hand Held Devices Personal Digital Assistants (PDA) & Smart Phones

23 Security Requirements  Loss of Confidentiality  Loss of Integrity  Loss of Availability

24 Risk Mitigation  Authentication  Encryption  Antivirus Software  PKI  VPN and Firewalls  Enterprise Solutions

25 Questions ?

26 Thank You


Download ppt "Wireless Network Security Presented by: Prabhakaran Theertharaman."

Similar presentations


Ads by Google