Wireless Network Security

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Packet Analyzers, a Threat to Network Security. Agenda Introduction The background of packet analyzers LAN technologies & network protocols Communication.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Securing a Wireless Network
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Firewall Security.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter Objectives In this chapter, you will learn:
Module 1: Understanding Local Area Networks
CompTIA Security+ Study Guide (SY0-401)
Wireless Security By: Bryan M Keller.
Port Knocking Benjamin DiYanni.
Instructor Materials Chapter 6 Building a Home Network
Secure Software Confidentiality Integrity Data Security Authentication
Securing A Wireless Network
Computer Networking Devices
Networks and Connecting to the Internet
Introduction to Networking
Security of a Local Area Network
Chapter 7 Connecting to the Internet
Topic 5: Communication and the Internet
Information Security Session October 24, 2005
Chapter 6 Networks Communicating and Sharing Resources
ISMS Information Security Management System
Firewalls Routers, Switches, Hubs VPNs
Computers in Society 12/1/2018.
Network hardening Chapter 14.
AbbottLink™ - IP Address Overview
Computer Networks Lesson 2.
Wireless Spoofing Attacks on Mobile Devices
LM 5. Wireless Network Security
Presentation transcript:

Wireless Network Security Tamara C Smith

Road Map Defining wireless security Wired equivalent privacy Steps to take before using wireless networks Wardriving/war chalking Packet Sniffers How to manage the web server security Problems Solutions Coclusion Questions?

What is wireless security? Wireless: to have no wires when connecting to another device or location Network: the grouping of two or more computers to one another Security: to ensure that all information is kept protected and available to users who are authorized Can also involve data encryption along with uing a id and password to access information

Wireless security deals with mainly the same concepts of security on a regular computer in most ways You have to have a set up that protects your information from unwanted sources. Having a setup makes it easier to prevent this from happening network your using radio signals to communicate with others through a network. using radio signals, other devices can pick up your signal when you’re traveling outside of your network

Other users can send and receive information without you even knowing about it Spams E-mails

Steps to take before using wireless networks Secure either your router or access points Broadcast your service set identifier (SSID) Allows others to view your network and try to compromise your network Instead of using encryption privacy, try enabling your Wi-Fi protected access Its easy to exploit weakness of wireless encryption privacy Use MAC filtering controls You can assign access to only networks in your system or those that know about your network Disable your remote admininstrator Should only be used when specifying a known IP address Anyone can find and get access to your network and make changes

Wired equivalent privacy Also known as W.E.P Intended to provide a level of data privacy that is the same to a wired network Seeks to establish similar protection to the offered by the wired networks physical security measures by encrypting data transmitted. Protects the vulnerable wireless link between clients and access points

War driving/War chalking This is a big threat when in comes to web security D: The act of driving around in a vehicle with a laptop computer, an antenna and an 802.11 wireless LAN adapter to exploit existing networks. also calls phone numbers to find unprotected modems C: resource of locating wireless networks for everyone to use marking buildings in the area of wireless networks. exploits wireless networks that have ranges that extend outside the perimeter of buildings In order to gain free internet access or illegal access to an organization’s data The idea is to provide a visual clue indicating the presence of wireless networks so that people can obtain a free Internet connection

How war chalkers display access points

Packet Sniffers Defined: a piece of a message transmitted over a packet-switching network contains the destination address in addition to the data. are often called datagram’s. (in IP networks ) It can be good and bad reads your information as it comes across the network without you even knowing. troubleshooting problems with network communications

Con’t example : There is software to prevent this from accruing if you’re sending information through an Ethernet network, all your information will be sent out like a relay for every PC to see. All the PC’s on the network should ignore it because it has a certain destination that it has to go There is software to prevent this from accruing Ethereal 0.8.18 Freeware Analyzer 2.1 Freeware Dsniff 2.3 Freeware

How to manage the web server security Remove all unneeded services from your web server. An unneeded service can become an avenue of attack Disallow all remote administration unless it is done using a one-time password or an encrypted link Limit the number of persons having administrator or root level access

Log all user activity and maintain those logs in an encrypted form on the web server store them on a separate machine on your Intranet

Intrusion Detection Systems very important when it comes to network security able to find out which network access has to be monitored more successful way to patrol your network for anything that is out of the ordinary on your network Started as a patrol of the standalone computer but it quickly evolved to a form of detection that had little to know limits beginning to develop detection systems that detect potential and some of the actual network invaders

Con’t Have the ability to create and decide which profile of expected user behavior Example: continuous log in attempt can lead to the network thinking that there is a hacker involved Send out a network issue message to inform the system admin Never overlook the messages that the network send you

Goals for IDS detecting attacks that involve the network scanning over the different hosts actually have the ability to create and decide which profile of expected user behavior

Problems Public web servers continue to be attractive targets for hackers seeking to embarrass organizations or promote a political agenda denial-of-service attack pornographic material posting of political messages deletion of files the placement of malicious software

Solutions Follow known best practices Apply software patches as soon as they are announced by your incident response team or your vendor.

Conclusion In summary after doing the research on wireless networks and security there are much to be learned and much to be discover. Everyday new technology is either invented, changed or updated. There are many hackers out there who try to compromise the networks whether its wireless networks or just networks systems. The only safe guards to secure your networks are to always be monitoring your systems. The debate what is actually better or secure is really up to the hackers that are able to exploit the systems. Only time will tell until there is a safe wireless network.

?Questions?