.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Security+ Guide to Network Security Fundamentals, Fourth Edition
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
A History of WEP The Ups and Downs of Wireless Security.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Security+ Guide to Network Security Fundamentals, Third Edition
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
National Institute of Science & Technology WIRELESS LAN SECURITY Swagat Sourav [1] Wireless LAN Security Presented By SWAGAT SOURAV Roll # EE
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Chapter 14 Network Encryption
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Advanced Penetration testing
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Wireless LAN Security CSE 6590.
Advanced Penetration testing
Wireless LAN Security 4.3 Wireless LAN Security.
Advanced Penetration testing
Presentation transcript:

 TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million

 Describe the basic IEEE wireless security protections  Define the vulnerabilities of open system authentication, WEP, and device authentication  Describe the WPA and WPA2 personal security models  Explain how enterprises can implement wireless security

 Institute of Electrical and Electronics Engineers (IEEE)  In the early 1980s, the IEEE began work on developing computer network architecture standards  This work was called Project 802  In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks)  At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps)

 In 1997, the IEEE approved the IEEE WLAN standard  Revisions  IEEE  IEEE a  IEEE b  IEEE g  IEEE n

 Access is controlled by limiting a device’s access to the access point (AP)  Only devices that are authorized can connect to the AP  One way: Media Access Control (MAC) address filtering  CSE uses this technique (unfortunately)

 Designed to ensure that only authorized parties can view transmitted wireless information  Uses encryption to protect traffic  WEP was designed to be:  Efficient and reasonably strong

 WEP secret keys can be 64 or 128 bits long  The AP and devices can hold up to four shared secret keys  One of which must be designated as the default key

 Before a computer can connect to a WLAN, it must be authenticated  Types of authentication in  Open system authentication  Lets everyone in  Shared key authentication  Only lets computers in if they know the shared key

 To connect, a computer needs the SSID (network name)  Routers normally send out beacon frames announcing the SSID  Passive scanning  A wireless device listens for a beacon frame

 For "security" some people turn off beacons  This annoys your legitimate users, who must now type in the SSID to connect  It doesn't stop intruders, because the SSID is sent out in management frames anyway  It can also affect roaming  Windows XP prefers networks that broadcast

 MAC addresses are transmitted in the clear  An attacker can just sniff for MACs  Managing a large number of MAC addresses is difficult  MAC address filtering does not provide a means to temporarily allow a guest user to access the network  Other than manually entering the user’s MAC address into the access point

 To encrypt packets WEP can use only a 64-bit or 128-bit number  Which is made up of a 24-bit initialization vector (IV) and a 40-bit or 104-bit default key  The 24-bit IV is too short, and repeats before long  In addition, packets can be replayed to force the access point to pump out IVs

 With the right equipment, WEP can be cracked in just a few minutes  You need a special wireless card

 Wireless Ethernet Compatibility Alliance (WECA)  A consortium of wireless equipment manufacturers and software providers  WECA goals:  To encourage wireless manufacturers to use the IEEE technologies  To promote and market these technologies  To test and certify that wireless products adhere to the IEEE standards to ensure product interoperability

 In 2002, the WECA organization changed its name to Wi- Fi (Wireless Fidelity) Alliance  In October 2003 the Wi-Fi Alliance introduced Wi-Fi Protected Access (WPA)  WPA had the design goal to protect both present and future wireless devices, addresses both wireless authentication and encryption  PSK addresses authentication and TKIP addresses encryption

 Preshared key (PSK) authentication  Uses a passphrase to generate the encryption key  Key must be entered into both the access point and all wireless devices  Prior to the devices communicating with the AP  The PSK is not used for encryption  Instead, it serves as the starting point (seed) for mathematically generating the encryption keys

 WPA replaces WEP with TKIP  TKIP advantages:  TKIP uses a longer 128-bit key  TKIP uses a new key for each packet

 WPA also replaces the (CRC) function in WEP with the Message Integrity Check (MIC)  Designed to prevent an attacker from capturing, altering, and resending data packets

 Wi-Fi Protected Access 2 (WPA2)  Introduced by the Wi-Fi Alliance in September 2004  The second generation of WPA security  Still uses PSK (Pre-Shared Key) authentication  But instead of TKIP encryption it uses a stronger data encryption method called AES-CCMP

 PSK Authentication  Intended for personal and small office home office users who do not have advanced server capabilities  PSK keys are automatically changed and authenticated between devices after a specified period of time known as the rekey interval

 People may send the key by or another insecure method  Changing the PSK key is difficult  Must type new key on every wireless device and on all access points  In order to allow a guest user to have access to a PSK WLAN, the key must be given to that guest

 A PSK is a 64-bit hexadecimal number  Usually generated from a passphrase  Consisting of letters, digits, punctuation, etc. that is between 8 and 63 characters in length  If the passphrase is a common word, it can be found with a dictionary attack

 AES-CCMP Encryption  Encryption under the WPA2 personal security model is accomplished by AES-CCMP  This encryption is so complex that it requires special hardware to be added to the access points to perform it

 Improves encryption and authentication  Encryption  Replaces WEP’s original PRNG RC4 algorithm  With a stronger cipher that performs three steps on every block (128 bits) of plaintext

 Key-caching  Remembers a client, so if a user roams away from a wireless access point and later returns, she does not need to re-enter her credentials  Pre-authentication  Allows a device to become authenticated to an AP before moving into range of the AP  Authentication packet is sent ahead

 Designed for medium to large-size organizations  Improved authentication and encryption  The authentication used is IEEE 802.1x and the encryption is TKIP

 IEEE 802.1x Authentication  Provides an authentication framework for all IEEE 802- based LANs  Does not perform any encryption  TKIP Encryption  An improvement on WEP encryption  Designed to fit into the existing WEP procedure

 The most secure method  Authentication uses IEEE 802.1x  Encryption is AES-CCMP

 Thin Access Point  An access point without the authentication and encryption functions  These features reside on the wireless switch  Advantages  The APs can be managed from one central location  All authentication is performed in the wireless switch

 Wireless VLANs  Can segment traffic and increase security  The flexibility of a wireless VLAN depends on which device separates the packets and directs them to different networks

 For enhanced security, set up two wireless VLANs  One for employee access  One for guest access

 Wireless protocol analyzer  Auditors carry it around sniffing for rogue access points  For more security, set up wireless probes to monitor the RF frequency

 Wireless device probe  Desktop probe  Access point probe  Dedicated probe