SlideShare a Scribd company logo
1 of 14
•   With Wireless Networking, no cables or wires
    are needed to network your computers and
    share your Internet connection.
•   WLANs offer a quick and effective extension
    of a wired network or standard LAN.
•   With a simple access point attached to the
    wired network, personal computers, laptops,
    handheld devices, printers, and other network
    devices can connect with the wired network at
    broadband speeds.
   ACCESS POINT
   BRIDGE
   NIC
   ANTENNA
   AAA SERVER
   NMS SERVER
   Anyone within the geographical network
    range of an open, unencrypted wireless
    network can 'sniff' or record the traffic, gain
    unauthorized access to internal network
    resources as well as to the internet.
    If router security is not activated or if the
    owner deactivates it for convenience, it
    creates a free hotspot.
   Rogue WLANs:-Unauthorized, “rogue” wireless
  LANs are clearly a foreseeable internal risk to the
  security, confidentiality, and integrity of customer
  information.
 Insecure WLANs:-Insecure wireless LANs are a
  recognized security risk. While wireless LANs are
  often deployed for their productivity benefits,
  security is often an afterthought.
 WLAN Policy violation:-WLAN policy violations
  are a recognized internal risk to the security,
  confidentiality, and integrity of customer
  information.
   Network Eavesdropping:-Because wireless
    communication is broadcast over radio waves,
    eavesdroppers who merely listen to the airwaves
    can easily pick up unencrypted messages.
    Additionally, messages encrypted with the Wired
    Equivalent Privacy (WEP) security protocol.
    Theft of WLAN credentials:-The theft of an
    authorized WLAN user’s identity poses one the
    greatest threats. Service Set Identifiers (SSIDs) that
    act as crude passwords and Media Access Control
    (MAC) addresses that act as personal identification
    numbers are often used to verify that clients are
    authorized to connect with an access point.
   Insertion attacks.
   Interception & unauthorized monitoring.
   Jamming.
   Client to client attacks.
   Brute force attacks.
   Encryption attacks.
   Misconfigurations.
There are three principle ways to secure a
 wireless lan .
1.) For closed networks (home users and
 organization)configure access restrictions in
 the access points.
2.) For commercial providers it should to be
 isolated wireless network.
3.) End to end encryption.
   Establish wireless LAN security policies.
   Design for security.
   Logically separate internal networks.
   Enable VPN access only.
   Remove unnecessary protocols.
   Restrict AP connections.
   Protect wireless devices.
A WLAN has some specific advantages:
 It is easier to add or move workstations.

 It is easier to provide connectivity in areas where it
  is difficult to lay cable.
 Installation is fast and easy, and it can eliminate
  the need to pull cable through walls and ceilings.
 Access to the network can be from anywhere within
  range of an access point.
 Portable or semi permanent buildings can be
  connected using a WLAN.
WLANs also have some disadvantages:
 As the number of computers using the network
  increases, the data transfer rate to each computer will
  decrease accordingly.
 As standards change, it may be necessary to replace
  wireless cards and/or access points.
 Lower wireless bandwidth means some applications
  such as video streaming will be more effective on a
  wired LAN.
 Security is more difficult to guarantee and requires
  configuration.
 Devices will only operate at a limited distance from an
  access point.
   Like most advances, wireless LANs poses
    both opportunities and risks. The technology
    can represent a powerful complement to an
    organization’s networking capabilities,
    enabling increased employee productivity and
    reducing IT costs.
Wireless LAN security

More Related Content

What's hot (20)

Wlan security
Wlan securityWlan security
Wlan security
 
Wi-Fi Technology
Wi-Fi TechnologyWi-Fi Technology
Wi-Fi Technology
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
WLAN
WLANWLAN
WLAN
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Virtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) pptVirtual Private Networks (VPN) ppt
Virtual Private Networks (VPN) ppt
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 
Network security
Network securityNetwork security
Network security
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

Viewers also liked

Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesCisco Mobility
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
 

Viewers also liked (6)

Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 

Similar to Wireless LAN security

Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaArpit Bhatia
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanZaibi Gondal
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAAiman Hud
 
What can you do with todays centralized wireless networks
What can you do with todays centralized wireless networksWhat can you do with todays centralized wireless networks
What can you do with todays centralized wireless networksexcitingip
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 

Similar to Wireless LAN security (20)

Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
What can you do with todays centralized wireless networks
What can you do with todays centralized wireless networksWhat can you do with todays centralized wireless networks
What can you do with todays centralized wireless networks
 
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationLAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
 
Wireless lan
Wireless lanWireless lan
Wireless lan
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Computer networks
Computer networksComputer networks
Computer networks
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 

More from Rajan Kumar

Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Temperature Distribution In Journal Bearing
Temperature Distribution In Journal BearingTemperature Distribution In Journal Bearing
Temperature Distribution In Journal BearingRajan Kumar
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d DigitizationRajan Kumar
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed SystemRajan Kumar
 
Implementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationImplementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationRajan Kumar
 
Fluorescent Multi-Layer Disc
Fluorescent Multi-Layer DiscFluorescent Multi-Layer Disc
Fluorescent Multi-Layer DiscRajan Kumar
 

More from Rajan Kumar (20)

Solar Sunseekar
Solar SunseekarSolar Sunseekar
Solar Sunseekar
 
Cmos Sensor
Cmos SensorCmos Sensor
Cmos Sensor
 
Wind Turbine
Wind TurbineWind Turbine
Wind Turbine
 
Wind Mill
Wind MillWind Mill
Wind Mill
 
Wimax
WimaxWimax
Wimax
 
Voip
VoipVoip
Voip
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Temperature Distribution In Journal Bearing
Temperature Distribution In Journal BearingTemperature Distribution In Journal Bearing
Temperature Distribution In Journal Bearing
 
Soler Car
Soler CarSoler Car
Soler Car
 
Sensors On 3d Digitization
Sensors On 3d DigitizationSensors On 3d Digitization
Sensors On 3d Digitization
 
Iptv
IptvIptv
Iptv
 
Holography
HolographyHolography
Holography
 
Foult Tolerence In Distributed System
Foult Tolerence In Distributed SystemFoult Tolerence In Distributed System
Foult Tolerence In Distributed System
 
Hydraulic Ram
Hydraulic RamHydraulic Ram
Hydraulic Ram
 
Implementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile CommunicationImplementation Of Bss And Nss In Mobile Communication
Implementation Of Bss And Nss In Mobile Communication
 
Infiband
InfibandInfiband
Infiband
 
Smart Cards
Smart CardsSmart Cards
Smart Cards
 
Jini
JiniJini
Jini
 
Fluorescent Multi-Layer Disc
Fluorescent Multi-Layer DiscFluorescent Multi-Layer Disc
Fluorescent Multi-Layer Disc
 
Manet
ManetManet
Manet
 

Wireless LAN security

  • 1.
  • 2. With Wireless Networking, no cables or wires are needed to network your computers and share your Internet connection. • WLANs offer a quick and effective extension of a wired network or standard LAN. • With a simple access point attached to the wired network, personal computers, laptops, handheld devices, printers, and other network devices can connect with the wired network at broadband speeds.
  • 3. ACCESS POINT  BRIDGE  NIC  ANTENNA  AAA SERVER  NMS SERVER
  • 4. Anyone within the geographical network range of an open, unencrypted wireless network can 'sniff' or record the traffic, gain unauthorized access to internal network resources as well as to the internet.  If router security is not activated or if the owner deactivates it for convenience, it creates a free hotspot.
  • 5. Rogue WLANs:-Unauthorized, “rogue” wireless LANs are clearly a foreseeable internal risk to the security, confidentiality, and integrity of customer information.  Insecure WLANs:-Insecure wireless LANs are a recognized security risk. While wireless LANs are often deployed for their productivity benefits, security is often an afterthought.  WLAN Policy violation:-WLAN policy violations are a recognized internal risk to the security, confidentiality, and integrity of customer information.
  • 6. Network Eavesdropping:-Because wireless communication is broadcast over radio waves, eavesdroppers who merely listen to the airwaves can easily pick up unencrypted messages. Additionally, messages encrypted with the Wired Equivalent Privacy (WEP) security protocol.  Theft of WLAN credentials:-The theft of an authorized WLAN user’s identity poses one the greatest threats. Service Set Identifiers (SSIDs) that act as crude passwords and Media Access Control (MAC) addresses that act as personal identification numbers are often used to verify that clients are authorized to connect with an access point.
  • 7. Insertion attacks.  Interception & unauthorized monitoring.  Jamming.  Client to client attacks.  Brute force attacks.  Encryption attacks.  Misconfigurations.
  • 8. There are three principle ways to secure a wireless lan . 1.) For closed networks (home users and organization)configure access restrictions in the access points. 2.) For commercial providers it should to be isolated wireless network. 3.) End to end encryption.
  • 9.
  • 10. Establish wireless LAN security policies.  Design for security.  Logically separate internal networks.  Enable VPN access only.  Remove unnecessary protocols.  Restrict AP connections.  Protect wireless devices.
  • 11. A WLAN has some specific advantages:  It is easier to add or move workstations.  It is easier to provide connectivity in areas where it is difficult to lay cable.  Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.  Access to the network can be from anywhere within range of an access point.  Portable or semi permanent buildings can be connected using a WLAN.
  • 12. WLANs also have some disadvantages:  As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.  As standards change, it may be necessary to replace wireless cards and/or access points.  Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.  Security is more difficult to guarantee and requires configuration.  Devices will only operate at a limited distance from an access point.
  • 13. Like most advances, wireless LANs poses both opportunities and risks. The technology can represent a powerful complement to an organization’s networking capabilities, enabling increased employee productivity and reducing IT costs.