Security Awareness Chapter 5 Wireless Network Security.

Slides:



Advertisements
Similar presentations
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Advertisements

Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Wi-Fi Structures.
Chapter 9 Connecting to and Setting up a Network
A Guide to major network components
Introduction to Computer Networking. Wireless Network.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Computer Networks IGCSE ICT Section 4.
Networking Components
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
OCR Computing for GCSE © Hodder Education 2011
Networking Components Chad Benedict – LTEC
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
Securing a Wireless Network
Wireless Networking 102.
Introduction to Healthcare Information Technology
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Components 101 Travis Hill.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
Chapter 5 Networks Communicating and Sharing Resources
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Addressing Networking for Home and Small Businesses – Chapter 5.
1 Network Security Revisited ITEC 370 George Vaughan Franklin University.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Common Devices Used In Computer Networks
– Chapter 5 – Secure LAN Switching
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Components of wireless LAN & Its connection to the Internet
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Network Components Kortney Horton LTEC October 20, 2013 Assignment 3.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Instructor Materials Chapter 6 Building a Home Network
Click to edit Master subtitle style
How To Set Up A Wireless Network
Chapter 12 Communications Security & Countermeasures
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Security Awareness Chapter 5 Wireless Network Security

Security Awareness, 3 rd Edition2 Objectives After completing this chapter you should be able to do the following: Explain what a network is and the different types of networks List the different attacks that can be launched against a wireless network Give the steps necessary to secure a wireless network

How Networks Work Understand the basics of how a network works –What is a network? –How does it transmit data? –Different types of networks –Devices typically found on a home wireless network Security Awareness, 3 rd Edition3

What Is a Computer Network? Purpose of a computer network is to share –Information –Devices such as printers Home network –Single Internet connection –Shared printer –Easier to perform backups Security Awareness, 3 rd Edition4

What Is a Computer Network? (cont’d.) Figure 5-2 Computer network Security Awareness, 3 rd Edition5 Course Technology/Cengage Learning

Transmitting Across a Network Sending and receiving devices must follow same set of standards (protocols) Transmission Control Protocol/Internet Protocol (TCP/IP) –Most common set of protocols used today IP address –Series of four sets of digits separated by periods –Static or dynamic Security Awareness, 3 rd Edition6

Transmitting Across a Network (cont’d.) Media Access Control (MAC) address –Physical address –12 characters separated by either dashes or colons Packets –Small units of data sent through network Security Awareness, 3 rd Edition7

Transmitting Across a Network (cont’d.) Figure 5-3 Sending data by packets Security Awareness, 3 rd Edition8 Course Technology/Cengage Learning

Types of Networks Two types of classifications –Distance-based Local area network (LAN) Wide area network (WAN) Personal area network (PAN) –Type of connection Wired Wireless local area network (WLAN) Wi-Fi (Wireless Fidelity) Security Awareness, 3 rd Edition9

Network Devices Network interface card (NIC) adapter –Hardware device that connects a computer to a wired network Router –Hardware device –Responsible for sending packets through the network toward their destination Firewall –Can repel attacks through filtering the data packets as they arrive at the perimeter of the network Security Awareness, 3 rd Edition10

Network Devices (cont’d.) Figure 5-5 Internal wireless NIC Security Awareness, 3 rd Edition11 Course Technology/Cengage Learning

Network Devices (cont’d.) Figure 5-6 Hardware firewall Security Awareness, 3 rd Edition12 Course Technology/Cengage Learning

Network Devices (cont’d.) Network Attached Storage (NAS) device –Dedicated hard disk-based file storage device –Provides centralized and consolidated disk storage available to network user Access point (AP) –Acts as the ‘‘base station’’ for the wireless network –Acts as a ‘‘bridge’’ between the wireless and wired networks Wireless gateway –Combine the features of an AP, firewall, and router in a single hardware device Security Awareness, 3 rd Edition13

Attacks on Wireless Networks Three-step process –Discovering the wireless network –Connecting to the network –Launching assaults Security Awareness, 3 rd Edition14

Discovering Beaconing –At regular intervals, a wireless router sends a signal to announce its presence Scanning –Wireless device looks for the incoming beacon information Wireless location mapping –Also known as war driving –Finding a beacon from a wireless network and recording information about it Security Awareness, 3 rd Edition15

Discovering (cont’d.) Tools needed for war driving –Mobile computing device –Wireless NIC adapter –Antenna Omnidirectional antenna –Global positioning system (GPS) receiver –Software Security Awareness, 3 rd Edition16

Discovering (cont’d.) Figure 5-8 USB wireless NIC Security Awareness, 3 rd Edition17 Course Technology/Cengage Learning

Connecting Service Set Identifier (SSID) –‘‘Network name’’ and can be any alphanumeric string from 2 to 32 characters Wireless networks are designed to freely distribute their SSID Once a wireless device receives a beacon with the SSID, it can then attempt to join the network –Virtually nothing that an attacker must do in order to connect Security Awareness, 3 rd Edition18 3 rd

Connecting (cont’d.) Figure 5-9 Connecting to a wireless network Security Awareness, 3 rd Edition19 Course Technology/Cengage Learning

Connecting (cont’d.) Some wireless security sources encourage users to configure APs to prevent the beacon from including the SSID –Does not provide protection Security Awareness, 3 rd Edition20

Launching Assaults Eavesdropping –Attackers can easily view the contents of transmissions from hundreds of feet away –Even if they have not connected to the wireless network Security Awareness, 3 rd Edition21

Launching Assaults (cont’d.) Wired Equivalent Privacy (WEP) –Ensure that only authorized parties can view transmitted wireless information –Encrypts information into ciphertext –Contains a serious flaw –Attacker can discover a WEP key in less than one minute Security Awareness, 3 rd Edition22

Launching Assaults (cont’d.) Stealing data –Once connected attacker treated as “trusted user” –Has access to any shared data Injecting malware –“Trusted user” enters from behind the network’s firewall –Can easily inject malware Storing illegal content –Can set up storage on user’s computer and store content Security Awareness, 3 rd Edition23

Launching Assaults (cont’d.) Launching denial of service (DoS) attacks –Denial of service (DoS) attack Designed to prevent a device from performing its intended function –Wireless DoS attacks Designed to deny wireless devicesaccess to the wireless router itself –Packet generator Create fake packets; flood wireless network with traffic –Disassociation frames Communication from a wireless device that indicates the device wishes to end the wireless connection Security Awareness, 3 rd Edition24

Launching Assaults (cont’d.) Figure 5-13 DoS attack using disassociation frames Security Awareness, 3 rd Edition25 Course Technology/Cengage Learning

Launching Assaults (cont’d.) Impersonating a legitimate network –Attackers will often impersonate legitimate networks in restaurants, coffee shops, airports, etc. –Does not require wireless router –Ad hoc or peer-to-peer network –Once the connection is made Attacker might be able to directly inject malware into the user’s computer or steal data Security Awareness, 3 rd Edition26

Wireless Network Defenses Secure the home wireless network Use an unprotected public wireless network in the most secure manner possible Security Awareness, 3 rd Edition27

Securing a Home Wireless Network Locking down the wireless router –Create username and password –Do not use default password –Typical settings on the wireless router login security screen Router Password Access Server Wireless Access Web Remote Management Security Awareness, 3 rd Edition28

Securing a Home Wireless Network (cont’d.) Figure 5-15 Wireless router login security screen Security Awareness, 3 rd Edition29 Course Technology/Cengage Learning

Securing a Home Wireless Network (cont’d.) Limiting users –Restrict who can access network by MAC address MAC address filter –Dynamic Host Configuration Protocol (DHCP) Wireless routers distribute IP addresses to network devices Properly configuring settings DHCP lease Security Awareness, 3 rd Edition30 3 rd

Securing a Home Wireless Network (cont’d.) Figure 5-16 MAC address filter Security Awareness, 3 rd Edition31 Course Technology/Cengage Learning

Securing a Home Wireless Network (cont’d.) Turning on Wi-Fi protected access 2 (WPA2) –Personal security model –Designed for single users or small office settings –Parts Wi-Fi Protected Access (WPA) Wi-Fi Protected Access 2 (WPA2) –To turn on WPA2 Choose security mode Select WPA Algorithm Enter shared key Security Awareness, 3 rd Edition32

Securing a Home Wireless Network (cont’d.) Figure 5-18 Security Mode options Security Awareness, 3 rd Edition33 Course Technology/Cengage Learning

Securing a Home Wireless Network (cont’d.) Figure 5-19 WPA Algorithms setting Security Awareness, 3 rd Edition34 Course Technology/Cengage Learning

Securing a Home Wireless Network (cont’d.) Configuring network settings –Network Address Translation (NAT) Hides the IP addresses of network devices from attackers Private addresses NAT removes the private IP address from the sender’s packet and replaces it with an alias IP address –Port address translation (PAT) Each packet is sent to a different port number Security Awareness, 3 rd Edition35

Securing a Home Wireless Network (cont’d.) –Virtual local area networks (VLANs) Segment users or network equipment in logical groupings Creates a separate virtual network for each user of the wireless network –Demilitarized Zone (DMZ) Separate network that sits outside the secure network perimeter Limits outside access to the DMZ network only Security Awareness, 3 rd Edition36

Securing a Home Wireless Network (cont’d.) Figure 5-21 Demilitarized zone (DMZ) Security Awareness, 3 rd Edition37 Course Technology/Cengage Learning

Securing a Home Wireless Network (cont’d.) –Port forwarding More secure than DMZ Opens only the ports that need to be available Security Awareness, 3 rd Edition38

Using a Public Wireless Network Securely Turning on a personal firewall –Runs as a program on the user’s local computer –Operates according to a rule base –Rule options Allow Block Prompt –Stateless packet filtering –Stateful packet filtering Provides more protection Security Awareness, 3 rd Edition39

Using a Public Wireless Network Securely (cont’d.) Virtual Private Networks (VPNs) –Uses an unsecured public network as if it were a secure private network –Encrypts all data that is transmitted between the remote device and the network –Advantages Full protection Transparency Authentication Industry standards Security Awareness, 3 rd Edition40

Figure 5-22 Virtual private network (VPN) Security Awareness, 3 rd Edition41 Course Technology/Cengage Learning

Summary Most home users install wireless networks Attacking a wireless network involves three main steps –Discovery –Connection –Attack Secure home wireless network Use good security when using public wireless networks Security Awareness, 3 rd Edition42