Presentation is loading. Please wait.

Presentation is loading. Please wait.

CompTIA Security+ Study Guide (SY0-401)

Similar presentations


Presentation on theme: "CompTIA Security+ Study Guide (SY0-401)"— Presentation transcript:

1 CompTIA Security+ Study Guide (SY0-401)
Chapter 5: Protecting Wireless Networks

2 Chapter 5: Protecting Wireless Networks
Given a scenario, troubleshoot security issues related to wireless networking. Explain types of wireless attacks.

3 Working with Wireless Systems
IEEE x Wireless Protocols The IEEE x family of protocols provides for wireless communications using radio frequency transmissions 802.11 802.11a 802.11b 802.11g 802.11i 802.11n

4 WEP/WAP/WPA/WPA2 Wired Equivalent Privacy
is a wireless protocol designed to provide privacy equivalent to that of a wired network The Wireless Application Protocol (WAP) is the technology designed for use with wireless devices Wi-Fi Protected Access and WPA2 Technologies were designed to address the core problems with WEP.

5 Wireless Transport Layer Security
Wireless Transport Layer Security (WTLS) is the security layer of the Wireless Application Protocol, discussed in the section “WEP/WAP/WPA/WPA2.” WTLS provides authentication, encryption, and data integrity for wireless devices.

6 Understanding Wireless Devices
Several levels of security exist in WAP: Anonymous Authentication This allows virtually anyone to connect to the wireless portal. Server Authentication This requires the workstation to authenticate against the server. Two-Way (Client and Server) Authentication This requires both ends of the connection client and server) to authenticate to confirm validity.

7 Wireless Access Points
The primary method of connecting a wireless device to a network is via a wireless portal A wireless access point (commonly just called an access point or AP) is a low-power transmitter/receiver, also known as a transceiver, which is strategically placed for access Radio frequency (RF) spectrum Called microwave

8 Chapter 5: Protecting Wireless Networks
Antenna Placement Antenna placement can be crucial in allowing clients to reach the access point. MAC Filtering The MAC address is the unique identifier that exists for each network card (part of the hexadecimal address identifies the manufacturer, and the other part acts as a serial number).

9 Chapter 5: Protecting Wireless Networks
Extensible Authentication Protocol (EAP) provides a framework for authentication that is often used with wireless networks Lightweight Extensible Authentication Protocol (LEAP) was created by Cisco as an extension to EAP is being phased out in favor of PEAP requires mutual authentication to improve security but is susceptible to dictionary attacks considered a weak EAP protocol

10 Chapter 5: Protecting Wireless Networks
Protected Extensible Authentication Protocol (PEAP) was created by Cisco, RSA, and Microsoft establishes an encrypted channel between the server and the client

11 Wireless Vulnerabilities
Wireless systems are vulnerable to all the different attacks that wired networks are vulnerable to All radio frequency signals can be easily intercepted Site surveys involve listening in on an existing wireless network using commercially available technologies

12 Wireless Vulnerabilities
War driving refers to driving around town with a laptop looking for APs that can be communicated with Warchalking involves those who discover a way into the network leaving signals (often written in chalk) on, or outside, the premise to notify others that the vulnerability is there

13 Chapter 5: Protecting Wireless Networks
Rogue access points Any wireless access point added to your network that has not been authorized is considered a rogue Evil twin attack one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit Bluejacking is the sending of unsolicited messages (think spam) over the Bluetooth connection Bluesnarfing is the gaining of unauthorized access through a Bluetooth connection


Download ppt "CompTIA Security+ Study Guide (SY0-401)"

Similar presentations


Ads by Google