Hosted by IDS for WLANs The Mansfield Group, LLC 802.11 Security for Enterprise Networks www.itvshop.com Wireless LAN Security Workshop Wash DC Honolulu.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

Ethical Hacking Module XV Hacking Wireless Networks.
Wireless LAN Security Understanding and Preventing Network Attacks.
Agenda Product Overview Hardware Interfaces Software Features
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Enterprise Data Solutions A Better Network. A Better ROI. Martin Matthews Technical Sales Engineer.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
COPYRIGHT © 2003 – 2004 AIRDEFENSE, INC. ALL RIGHTS RESERVED. Put Wireless LAN Security Monitoring in your budget. - Gartner AirDefense Market Leader in.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
 2009 AirTight Networks. Financial Districts Wireless Vulnerability Study A study conducted by AirTight Networks, Inc.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
ECE 578: COMPUTER NETWORK AND SECURITY
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
AirDefense’s Role in Wireless Security
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Chapter 6 of the Executive Guide manual Technology.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Presented by: Dr. Munam Ali Shah
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.
Note1 (Admi1) Overview of administering security.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Wireless Intrusion Prevention System
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
WISECURE Exam CCNP Wireless WISECURE Exam
Chapter 7. Identifying Assets and Activities to Be Protected
WIRELESS INTRUSION DETECTION SYTEMS
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Wireless Technologies
Chapter 4: Wireless LANs
Security of a Local Area Network
IS4680 Security Auditing for Compliance
TRIP WIRE INTRUSION DETECTION SYSYTEM Presented by.
Presentation transcript:

Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu The Mansfield Group, LLC Brian Mansfield Chief Security Consultant The Mansfield Group, LLC Is your WLAN really protected? Is your WIRED network really protected?

Hosted by Should you care? The Mansfield Group, LLC

Hosted by The number of frequent WLAN users in North America will grow from 4.2 million in 2003 to... more than 31 million by 2007 Gartner Symposium/ITxpo 2003 The Mansfield Group, LLC

Hosted by Enterprise Market Drivers: Wi-Fi client ubiquity Centrino market penetration 95% of new laptops include Wi-Fi by 2004 WLAN “Switch” technology Vendor neutral deployment options Effective network security & mgmt solutions Range of infrastructure investment options Wi-Fi’s “Secret Weapon” - VoWLAN Voice & data through single device One-number connectivity on campus The Mansfield Group, LLC

Hosted by Infonetics Research - Worldwide WLAN Hardware Forecast

Hosted by “…but our company has no plans to deploy a WLAN…” Guess what? You still need a WIDS strategy! The Mansfield Group, LLC

Hosted by HostAP Airjack AirSnarf ROGUE AP’s Kismet Wallenreiter Airsnort Netstumbler YOUR EMPLOYEES! Knoppix File2air cqure AP Why? Soft APs The Mansfield Group, LLC Accidental associations Malicious associations

Hosted by Risk Points within the Enterprise Employees install unauthorized APs Employees share files via Ad-Hoc mode Employees carry Wi-Fi enabled clients Employees connect to WAN via home WLAN Employees are vulnerable to attack APs The Mansfield Group, LLC Employees connect to WAN via public Hotspots

Hosted by Likely Sources of Attack CSI/FBI 2003 Computer Security Survey

Hosted by Security Stragegy for Companies with NO WLAN Draft WLAN Security Policy Monitor Your Airspace Enforce Security Policy, Update & Refine The Mansfield Group, LLC Conduct WLAN Security Assessment

Hosted by RF BROADCAST OVERFLOW

Hosted by Survey airspace inside your organization What protocols/data is being transmitted? Where are they located? Are any connected to your LAN? Sweep airspace around perimeter What protocols/data is being transmitted? Where are they located? How are they configured? What external sources are penetrating environment? What devices are broadcasting in your environment? The Mansfield Group, LLC 1. Conduct WLAN Security Assessment

Hosted by 2. Draft WLAN Security Policy Extension to Existing IT Security Policy Protect assets that require integrity (financial, medical) Configuration, Systems Use & IRP Policy Protect assets that need confidentiality (payroll, HIPPA) Protect assets that need high availability (order, transact) Prohibit unsanctioned APs / ad-hoc networking? Incident response procedure (IRP) Policy for public Hotspot & home WLAN use Configuration standards - Wi-Fi enabled? XP, WEP, SSID The Mansfield Group, LLC

Hosted by 3. Monitor Your Airspace - Verify policy adherence Internal monitoring Perimeter monitoring Unsanctioned APs / rogue AP detection Machine/device configuration violations External systems broadcasting availability? Network intrusions or attacks Use violations - ad hoc networking The Mansfield Group, LLC

Hosted by 4. Enforce Policy, Update & Refine The Mansfield Group, LLC Active response: Reset device Reconfigure device Disconnect device Passive response: SNMP Syslog Audit trail / forensic database

Hosted by Security Technologies Used CSI/FBI 2003 Computer Security Survey The Mansfield Group, LLC

Hosted by MANUAL DISTRIBUTED INTEGRATED MANAGED WIDS Product Mix The Mansfield Group, LLC

Hosted by MANUAL Handheld/laptop scanner “Snapshot” view Rogue AP & client detection Performance statistics Security alarms RF analysis & site survey GPS logging The Mansfield Group, LLC

Hosted by DISTRIBUTED Radio sensors 24 x 7 monitoring Policy enforcement Stateful analysis Centrally managed & paging alerts IPS capabilities (SNMP) The Mansfield Group, LLC HQ - Washington DC Sensor Chicago Sensor Boston Management Server Sensor Rogue AP DoS Attack Unauthorized AP User Security Violation

Hosted by INTEGRATED “Wireless-aware” switch IDS module in AP Rogue AP location ID Dynamic site surveys Security policy monitoring Radio resource mgmt Enhanced IPS The Mansfield Group, LLC L2/L3 Switch or Mgmt Server AP Rogue AP

Hosted by MANAGED Dedicated team of IDS experts Maintain system access & control while outsourcing daily monitoring tasks Customization of services - rogue AP, reporting, custom signature sets, forensics, etc. Escalation procedure management - incident response, notification and mitigation actions Long-term TCO benefits - Lease vs. buy option Integrate & correlated w/wired IDS or IPS The Mansfield Group, LLC

Hosted by WLAN Attack Scenarios The Mansfield Group, LLC Layer 1 - Denial of Service Layer 2 - Rogue AP Layer 3 - IP Hi-jack

Hosted by

Airsnort SAME SSID CH1 & CH3 The Mansfield Group, LLC

Hosted by DIFFERENT SUBNETS Kismet The Mansfield Group, LLC

Hosted by CRC DoS ALARM The Mansfield Group, LLC

Hosted by The Mansfield Group, LLC

Hosted by AiroPeek The Mansfield Group, LLC Rogue AP

Hosted by NEW IP SUBNET

Hosted by Do you telecommute or connect to your company network from home? 1. Yes 2. No

Hosted by Do you use a Wi-Fi network at home? 1. Yes 2. No

Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu The Mansfield Group, LLC Brian Mansfield Chief Security Consultant The Mansfield Group, LLC Is your WIRED network really protected?