CompTIA Security+ Study Guide (SY0-401)

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Security+ All-In-One Edition Chapter 10 – Wireless Security
Network Attacks. Topics Objectives Rogue Devices Rogue Infrastructure Hardware Placement Data Theft & Malicious Insertion Security Feature Weaknesses.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Protected Extensible Authentication Protocol
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
KIRAN CHAMARTHI NETWORK SECURITY
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
CIST 1601 Information Security Fundamentals Chapter 12 Wireless Networking Security Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft.
Network and Internet Security
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Security+ Guide to Network Security Fundamentals, Fourth Edition
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Wireless Security Chapter 12.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
WIRELESS LAN SECURITY Using
Wireless and Security CSCI 5857: Encoding and Encryption.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Chapter 8 Connecting Wirelessly
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security Tabatha Lakkala Outline 2  Wireless Access Points  Define Wireless Access Points  Hidden and not so hidden dangers  How to protect.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Chapter 4 Review McKinley Technology High School – Ms. Wiscount.
Chapter 5 LANs and WLANs.
Wireless Networks Dave Abbott.
Security+ Guide to Network Security Fundamentals, Fifth Edition
Authentication and handoff protocols for wireless mesh networks
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Fidelity 1 1.
Wireless Network Security
A Wireless LAN Security Protocol
Wireless Networking Chapter 23.
On and Off Premise Secure Access
CompTIA Security+ Study Guide (SY0-501)
Wireless LAN Security 4.3 Wireless LAN Security.
Wi-Fi Technology.
Security Issues with Wireless Protocols
Presentation transcript:

CompTIA Security+ Study Guide (SY0-401) Chapter 5: Protecting Wireless Networks

Chapter 5: Protecting Wireless Networks Given a scenario, troubleshoot security issues related to wireless networking. Explain types of wireless attacks.

Working with Wireless Systems IEEE 802.11x Wireless Protocols The IEEE 802.11x family of protocols provides for wireless communications using radio frequency transmissions 802.11 802.11a 802.11b 802.11g 802.11i 802.11n

WEP/WAP/WPA/WPA2 Wired Equivalent Privacy is a wireless protocol designed to provide privacy equivalent to that of a wired network The Wireless Application Protocol (WAP) is the technology designed for use with wireless devices Wi-Fi Protected Access and WPA2 Technologies were designed to address the core problems with WEP.

Wireless Transport Layer Security Wireless Transport Layer Security (WTLS) is the security layer of the Wireless Application Protocol, discussed in the section “WEP/WAP/WPA/WPA2.” WTLS provides authentication, encryption, and data integrity for wireless devices.

Understanding Wireless Devices Several levels of security exist in WAP: Anonymous Authentication This allows virtually anyone to connect to the wireless portal. Server Authentication This requires the workstation to authenticate against the server. Two-Way (Client and Server) Authentication This requires both ends of the connection client and server) to authenticate to confirm validity.

Wireless Access Points The primary method of connecting a wireless device to a network is via a wireless portal A wireless access point (commonly just called an access point or AP) is a low-power transmitter/receiver, also known as a transceiver, which is strategically placed for access Radio frequency (RF) spectrum Called microwave

Chapter 5: Protecting Wireless Networks Antenna Placement Antenna placement can be crucial in allowing clients to reach the access point. MAC Filtering The MAC address is the unique identifier that exists for each network card (part of the hexadecimal address identifies the manufacturer, and the other part acts as a serial number).

Chapter 5: Protecting Wireless Networks Extensible Authentication Protocol (EAP) provides a framework for authentication that is often used with wireless networks Lightweight Extensible Authentication Protocol (LEAP) was created by Cisco as an extension to EAP is being phased out in favor of PEAP requires mutual authentication to improve security but is susceptible to dictionary attacks considered a weak EAP protocol

Chapter 5: Protecting Wireless Networks Protected Extensible Authentication Protocol (PEAP) was created by Cisco, RSA, and Microsoft establishes an encrypted channel between the server and the client

Wireless Vulnerabilities Wireless systems are vulnerable to all the different attacks that wired networks are vulnerable to All radio frequency signals can be easily intercepted Site surveys involve listening in on an existing wireless network using commercially available technologies

Wireless Vulnerabilities War driving refers to driving around town with a laptop looking for APs that can be communicated with Warchalking involves those who discover a way into the network leaving signals (often written in chalk) on, or outside, the premise to notify others that the vulnerability is there

Chapter 5: Protecting Wireless Networks Rogue access points Any wireless access point added to your network that has not been authorized is considered a rogue Evil twin attack one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit Bluejacking is the sending of unsolicited messages (think spam) over the Bluetooth connection Bluesnarfing is the gaining of unauthorized access through a Bluetooth connection