Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Payment Card Industry (PCI) Data Security Standard
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Securing a Wireless Network
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
A History of WEP The Ups and Downs of Wireless Security.
Wireless Networks Tamus, Zoltán Ádám
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security. What is a Wireless Network Wireless networks serve as the transport mechanism between devices and among devices and the traditional.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wireless Networking & Security Greg Stabler Spencer Smith.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WAP vs. WEP Prof. Carlos Rodríguez Sánchez. WAP WAP Wireless Application Protocol a secure specification that allows users to access information instantly.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Understand Wireless Security LESSON Security Fundamentals.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Networking Chapter 23.
Presentation transcript:

Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ

What is the need to go wireless? Wireless communication has developed enormously over the last past years allowing instant and fast communication from point to point (s). It has been adopted by businesses and professional users who depend on “up to the minute information” to conduct daily business activities. Is this communication secure? If so, how?

Wireless Security Requirements Reported incidents in terms of security and data/investments loss call for more measures. Any secure mobile solution must follow this functionality: Authentication Encryption Access & Accountability

Security: Authentication Low level of authentication must have one of the following categories: Something you know (i.e. user name and password/pin) Something you are (i.e. finger prints) Something you have (i.e. smart card/employee ID card) A combination of those will make authentication stronger.

Security: Encryption No encryption used for wireless has been critical to security. WEP (Wired equivalent privacy) was not intended for security and encryption. It was only for casual eavesdropping or unauthorized data modification. Encryption recomemded: PKI (Public key infrastructure) 128 bit minimum encryption Use of AES (Advanced encryption standard)

Security: Access & Accountability User should only be allow to authorized information Tracking use of services access by user. Ensuring the principal of C.I.A (Confidentiality, Integrity & Availability)

Security: Wireless Break-ins Many of the securities weaknesses are created by the user itself as a result of ignorance and/or disregard for security. Vulnerabilities and how to fix them: Rogue Access Points Chatty Laptops Unconfigured Access Points Ignoring Security Standards

Rogue Access Points Vulnerability: They are not secure. They are not yours & they can read your traffic as well. Alternative: Use IDS (intrusion detection System) to detect rogue Wlans and monitor Wlan. End user: inexpensive idsinexpensive ids

Chatty Laptops Vulnerability: Once laptop on, it look for an access point to talk to. Devices have no brain – therefore they do what they are designed to do. Alternative: Follow configuration standards from your employer Learn configuration policies from provider.

Unconfigured Access points Vulnerability: Access point equipment such as Lynksys or Cisco has default passwords. Ex. Cisco is “Tsunami” Alternative: IT departments or local administrator must configure devices assigning proper ids and password.

Ignoring Security Standards Vulnerability: Anyone sniffing the air can read packets from unsecured devices. Companies indicate how to connect wirelessly, users ignore standards and forget about security. Alternative: If equipment granted by company, standards should be implemented in system before assigning equipment to users. & Enforcing policies by regularly checking on equipment.

Unencryption  Solutions Unencrypted: MAC registration: restrict DHCP leases to know MAC addresses. Verifies card have been registered, cannot verify the user. Firewall: Use of HTTP, HTTPs. Request is sent to authentication server. Added components are: user name, time stamp, failure.

Encryption  Solutions Encrypted: WEP wired equivalent privacy works with another security system to provide authentication. Changing the value of IV after each transmission. MAC addresses are sent in the clear VPN virtual private network, provides higher level of security using advanced encryption algorithms.

WEP encryption

Wireless Application Protocol (WAP) Developed to implement a standard for communication between wireless devices and the Internet. Improve productivity, service, installation speed, cost. WAP capabilities coexist with Bluetooth and WLANs Currently allows authentication, privacy and secure connections; non-repudiation and integrity checks. WAP provides PKI services via supporting services.

Potential WAP security solution

T-mobile hot spot ensures: “Our network now supports the IEEE 802.1x security standard with WiFi Protected Access (WPA). This provides robust encryption of data transfer over the air between devices connected via WPA”. Quote from WPA is called Temporal Key Integrity Protocol (TKIP).TKIP takes the original master key only as a starting point and derives its encryption keys mathematically from this master key. TKIP then regularly changes and rotates the encryption keys so that the same encryption key is never used twice.

On the news: Wireless Cnn.com: Cities find Wi-Fi future Will they be secure? Do users really know how this works? Cnn.com: Wireless life, Avoid break-ins. Easy steps for unaware wireless users.

What NetStumbler can do for you? NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using b, a and g. It has many uses: Verify that your network is set up the way you intended. Find locations with poor coverage in your WLAN. Detect other networks that might be causing interference with your network. Detect unauthorized "rogue" access points in your workplace. Help aim directional antennas for long-haul WLAN links. Use it recreationally for WarDriving.

Network Stumbler:

NetStumbler – Results

NetStumbler - Findings

NetStumble – Results at MSU Science Building

IEEE WLAN Standards

References: All references noted on final report, please see documentation. Montclair State University Computer Science Department Montclair, New Jersey - USA