Presentation is loading. Please wait.

Presentation is loading. Please wait.

James Tucker Dr. Durrett ISQS 6342

Similar presentations


Presentation on theme: "James Tucker Dr. Durrett ISQS 6342"— Presentation transcript:

1 James Tucker 459650490 Dr. Durrett ISQS 6342
Wired or Wireless? James Tucker Dr. Durrett ISQS 6342

2 Summary Food for Thought Corporate Level University Level
Public Access Level

3 Food For Thought1 10 Steps to Secure a Wireless Network
Control your broadcast area Lock each AP Ban rogue access points Use 128-bit WEP Use SSIDS wisely Limit access rights Limit the number of user addresses Authenticate users Use RADIUS Call in the big boys

4 Control your broadcast area: wireless access points allow for control of signal strength, and some direction. Place in center of area. Lock each AP: people don’t change the darn defaults! Change them – and MAKE IT GOOD!!! ( click on password dos and don’ts) Ban rogue access points: if you have an AP on your network, make sure you put it there. (

5 Use 128-bit WEP: adds a layer of difficulty
Use 128-bit WEP: adds a layer of difficulty. HOWEVER easily cracked with freeware ( Use SSIDS wisely: Change the defaults – AGAIN! Service Set Identifiers (SSIDS) show all your AP information. Also, buy a product that allows you to disable broadcasting the SSIDS. Limit access rights: Authorized MAC cards only!

6 Limit # of user addresses: constrict the # of DHCP addresses to just enough – then if you have some connection trouble you know you have unauthorized access! Authenticate users: firewalls with VPN connectivity, and require log-ons. Use RADIUS: provides another authentication method (time of day & simultaneous) – can be pricey. ( Call in the big boys: AirDefense, server appliance that monitors activity and protects traffic on LANs – really pricey ($10k - $100k depending on # sensors)

7 Corporate Level Attacks to Consider: WEP Attacks WAP Attacks
Brute Force

8 Corporate Level Security Design IT Sub Department Diagram User Levels
Spec Hardware Spec Software Diagram User Levels Define User Access Define LAN Architecture (Wired and Wireless) Define DMZ’s Define Firewall Protocols Define Wireless Sniffing Tools

9 Corporate Level IT Sub Department: ruthless individuals
Spec Hardware based upon needs (# of AP’s defined by # of users, etc…) Go for a!!! Spec Software based upon required security Granted – Pocketbook is King Diagram User Levels: who needs access to what? Employee status, Employee Area, Employee Expertise

10 Corporate Level Define LAN Architecture: Does the entire building need wireless? Remember 10 steps. Hardwire offices, meeting rooms, etc… Wireless for open spaces, floor level access for IT employees Define DMZs: What is available online? What is available to Wireless protocols?

11 Demilitarized Zones

12 Corporate Level Define Firewall Protocols
Allow only ports and protocols needed Kill Telnet, ping, port-scan, etc… Define Wireless Sniffing Tools Use of sniffers to determine unauthorized access is becoming more and more popular. Example: Wavelink’s Mobile Manager. (

13 Mobile Manager by Wavelink
Reduction of DNS attacks through Access Point profiles (streamlining of all AP profiles)

14 University Level Treat it like Corporate:
Much less likely to have money requirements of a, BUT: Securing b is defined by: Broadcast area Sniffing Restricting # Users Restricting Access Rights

15 University Level Use of 802.11b requires more physical security:
Wardriving still possible Attacks through Staff Attacks through dormatories Requires a very accurate listing of User MAC addresses Requires accurate accounting for DHCP address use

16 University Level Time of Day lockdown implementation
Set-up of DMZ is critical Just as important as securing corporate data is securing sensitive University data Grades, Degree Plans, Financial Information, etc… Building by building better than broadcast cloud

17 Public Access Level Problems: Answers
Unlike Corporate or University Level, listing MAC addresses is more difficult. Creating the correct DMZ cloud Answers Setting up an account service requiring MAC addresses of users Creating architecture of system before implementation!

18 Closing Be Smart and Realize that no network is perfect!
Hire Good People with a diverse background in Security (More eyes and ears!) Restrict User Access Restrict Number of Users Use of Sniffing Tools Change the Defaults!

19 Reference Security Watch, PC MAGAZINE, February 25th, 2003, Hacking Exposed, McClure, Scambray, Kurtz, McGrawHill, Chicago, 2001. Secrets & Lies, Schneier, Wiley, New York, 2000. Cisco AVVID Network Infrastructure Enterprise Wireless LAN Design, Adobe Acrobat Presentation,

20 Questions? Queries? Posers? Inquiries? Huh?


Download ppt "James Tucker Dr. Durrett ISQS 6342"

Similar presentations


Ads by Google