Certified Wireless Network Administrator (CWNA) PW0-105 Chapter 13 802.11 Network Security Architecture.

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Wireless network security Lt. Robert Drmola, University of defence, Communication and information system department.
Security in Wireless Networks Juan Camilo Quintero D
Chapter 07 Designing and Implementing Security for WLAN
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
F ACULTY OF C OMPUTER S CIENCE & E NGINEERING. C ONTENTS OF SYLLABUS Chapter 01. Introduction to Wireless LANs Chapter 02. Radio Frequency Chapter 03.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 15 RF Site Survey Fundamentals
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Wireless Encryption: WEP and cracking it. Eric Shea.
Wireless Networking & Security Greg Stabler Spencer Smith.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Wireless Authentication & 802.1X By Gareth Ayres.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Understand Wireless Security LESSON Security Fundamentals.
Wireless Protocols WEP, WPA & WPA2.
Network Infrastructure
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
Configure a Wireless Router
Configure a Wireless Router
LM 5. Wireless Network Security
Presentation transcript:

Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture

Chapter 13 Overview Security Basics Legacy Security Robust Security Traffic Segmentation Infrastructure Security VPN Wireless Security 2 Certified Wireless Network Administrator: CWNA – PW0-105

Security Basics Data privacy AAA Segmentation Monitoring Policy 3 Certified Wireless Network Administrator: CWNA – PW0-105

Data Privacy About the protection of data and the prevention of unauthorized access to it Uses encryption –RC4 –AES Exercise Certified Wireless Network Administrator: CWNA – PW0-105

AAA Authentication –Who are you? –What are you? Authorization –What can you do? Accounting –What did you do? 5 Certified Wireless Network Administrator: CWNA – PW0-105

Segmentation LANs WANs VLANs 6 Certified Wireless Network Administrator: CWNA – PW0-105

Policy Defines how computer systems must be implemented –Specific WiFi policies must be created –Traditional wired policies are not sufficient 7 Certified Wireless Network Administrator: CWNA – PW0-105

Legacy Security Legacy authentication –Open System –Shared Key Static WEP encryption MAC filters SSID cloaking or hiding 8 Certified Wireless Network Administrator: CWNA – PW0-105

WEP Key and IV 9 Certified Wireless Network Administrator: CWNA – PW0-105

Robust Security vs. Legacy Security 10 Certified Wireless Network Administrator: CWNA – PW0-105

Robust Security Network (RSN) 11 Certified Wireless Network Administrator: CWNA – PW , originally i, define an RSN –STAs must use the 4-way handshake –STAs must use CCMP or TKIP Pre-Shared Key (PSK) Proprietary PSK –Dynamic PSK and Private PSK are examples 802.1X/EAP

802.1X Comparison 12 Certified Wireless Network Administrator: CWNA – PW0-105

WLAN Bridging and 802.1X 13 Certified Wireless Network Administrator: CWNA – PW0-105

802.1X/EAP Architecture and Process 14 Certified Wireless Network Administrator: CWNA – PW0-105

EAP Types 15 Certified Wireless Network Administrator: CWNA – PW0-105

Traffic Segmentation 16 Certified Wireless Network Administrator: CWNA – PW0-105 VLANs –Guest –Voice –Data RBAC

Wireless VLANs 17 Certified Wireless Network Administrator: CWNA – PW0-105

Infrastructure Security 18 Certified Wireless Network Administrator: CWNA – PW0-105 PhysicalInterface

VPN Wireless Security (Hotspot) 19 Certified Wireless Network Administrator: CWNA – PW0-105

VPN Wireless Security (Site-to-Site) 20 Certified Wireless Network Administrator: CWNA – PW0-105

Chapter 13 Summary Security Basics Legacy Security Robust Security Traffic Segmentation Infrastructure Security VPN Wireless Security 21 Certified Wireless Network Administrator: CWNA – PW0-105