Download presentation
Presentation is loading. Please wait.
Published byNathan Watkins Modified over 8 years ago
1
Wireless security
2
Submitted To: Er. S.K. Soni [Dy. Head,CSE] Submitted By: Gurjeet Barar CSE Branch IV Year(VII sem) A-2 Batch JODHPUR INSTITUTE OF ENGINEERING & TECHNOLOGY
3
INTRODUCTION wireless networking –readily available, affordable and easy to use. popularity of wireless networking in private and commercial areas business. Interfaces with public areas. Some Wi-Fi operaters do not deploy any network security. Wired Equivalent Privacy as its default security protocol— widely recognized as being easily broken.
4
Unauthorised Access cases Access to Computers : To deface/change information To obtain information To copy information To affect operation
5
Access to Networks : To obtain access To mask identity
6
Wireless Hacking Examples of possible conduct or security failure. exploiting the vulnerability of a wireless network to hack into the computer or computer system. unauthorized (or in excess of authorization) access to a computer to steal information for their own purposes (data theft). unauthorized (or in excess of authorization) access to a computer to deface information for their own purposes (malicious hackers). Eavesdropping: monitoring the wireless transmissions. interception of electronic communication. intentionally disclosure of the contents of electronic communication.
7
Privacy Challenges Anything connected can potentially be tracked Who should be able to track what? Balancing business benefits and privacy – e.g., track the product in the store, but not on the consumer Cryptography offers new tradeoffs
8
WLAN Security: Why it matter? International concerns. Access point ≈ Wireless Hub Difficult to trace attackers Low cost hacking equipment Typical insecure WLAN deployments Lack of user/admin security awareness Technology limitations & vulnerabilities
9
WLAN Security Threats 1. Jamming or denial ofservice attack 2. 2.4 GHz RF jamming
10
WLAN Security Threats User hijacking & Man-in-the-middle attack Inverse Wardriving Sniff & Modify Fake server Https hack Password stealing “Phishing”
11
Advantages It is easier to add or move workstations. It is easier to provide connectivity in areas where it is difficult to lay cable. Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings. Access to the network can be from anywhere within range of an access point. Portable or semipermanent buildings can be connected using a WLAN. Although the initial investment required for WLAN hardware can be similar to the cost of wired LAN hardware, installation expenses can be significantly lower.
12
Disadvantages As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly. As standards change, it may be necessary to replace wireless cards and/or access points. Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN. Security is more difficult to guarantee and requires configuration. Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.
13
· www.wikipedia.com Computer Networks by Tannenbaum ·Computer Networks by Forouzan REFERENCES
14
Thank You
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.