Wireless Device and Network level security

Chetan Kumar S
Chetan Kumar SCo-Founder at AiKaan um AiKaan
Security at Device, Network & Server Levels QIP Short Term Course On Wireless  Security Chetan Kumar Shivakumar Protocol Engineering and Technology Unit, IISc. (Currently working at Alcatel Lucent India Limited) e-mail shivakumar.chetan@gmail.com
Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Security specifics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Data on mobile device ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile device security Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile device security Threat ,[object Object],[object Object],[object Object]
Environmental Threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
Few solutions for device security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy enforced solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OS Security Mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Level Security
Why do we need network security I can send mail to all news channels using wifi access from this building. No non-repudiation
Why do we need network security I can get the passwords now sitting outside this building Internet Banking is so easy with WiFi at home Eves dropping
Why security is more of a concern in wireless ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why security is more of a concern in wireless ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why security is more of a concern in wireless ? ,[object Object],[object Object]
Network Level Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LAN Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Set Identifier (SSID) ‏ ,[object Object],[object Object],[object Object],[object Object]
MAC Address Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object]
Issues with MAC Address Filtering ,[object Object],[object Object],[object Object]
End of session 1 ,[object Object]
Session 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is WPA? ,[object Object],[object Object]
WPA in nut shell… ,[object Object],[object Object],[object Object],[object Object]
WPA in nut shell… ( Cont’d ) ‏ ,[object Object],[object Object],[object Object],[object Object]
WPA Modes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In Summary ,[object Object],[object Object],[object Object]
AdHoc Network Security issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Server Level Security ,[object Object],[object Object],[object Object]
Security Threats in Servers ,[object Object],[object Object],[object Object],[object Object]
Securing the Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ,[object Object],[object Object]
Backup Slide ,[object Object]
1 von 42

Recomendados

Wireless security presentation von
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
40.5K views21 Folien
WPA 3 von
WPA 3WPA 3
WPA 3diggu22
1.3K views18 Folien
Wireless Networking Security von
Wireless Networking SecurityWireless Networking Security
Wireless Networking SecurityAnshuman Biswal
4.8K views30 Folien
Wi fi protected access von
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
2.4K views17 Folien
Wireless Network Security von
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
1.1K views16 Folien
Wired equivalent privacy (wep) von
Wired equivalent privacy (wep)Wired equivalent privacy (wep)
Wired equivalent privacy (wep)akruthi k
1.8K views29 Folien

Más contenido relacionado

Was ist angesagt?

Wireless network security von
Wireless network securityWireless network security
Wireless network securityShahid Beheshti University
594 views26 Folien
Wpa vs Wpa2 von
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2Nzava Luwawa
3.9K views30 Folien
WEP von
WEPWEP
WEPSudeep Kulkarni
6.2K views17 Folien
WPA2 von
WPA2WPA2
WPA2Mshari Alabdulkarim
18.3K views38 Folien
Chapter 7 - Wireless Network Security.pptx von
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
152 views28 Folien
WiFi Secuiry: Attack & Defence von
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefencePrakashchand Suthar
16.2K views49 Folien

Was ist angesagt?(20)

Chapter 7 - Wireless Network Security.pptx von AmanuelZewdie4
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4152 views
Wifi Security von Shital Kat
Wifi SecurityWifi Security
Wifi Security
Shital Kat2.4K views
Data Security in Local Area Network Using Distributed Firewall von Manish Kumar
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
Manish Kumar2.1K views
Vpn(virtual private network) von sonangrai
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai1.7K views
VPN (virtual private network) von Netwax Lab
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab3.1K views
Transport Layer Security (TLS) von Arun Shukla
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
Arun Shukla11K views
Enhancing lan using cryptography and other modules von Murali Krishna
Enhancing lan using cryptography and other modulesEnhancing lan using cryptography and other modules
Enhancing lan using cryptography and other modules
Murali Krishna604 views

Destacado

Internet Issues (How to Deal on Internet Security) von
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
3K views19 Folien
Information Security von
Information SecurityInformation Security
Information SecurityDr. Himanshu Gupta
1.2K views40 Folien
network security, cryptography,steganography von
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganographyNikhil l
4.4K views23 Folien
Slideshire von
SlideshireSlideshire
Slideshireaulaguadalinfo
12.8K views4 Folien
Radio waves presentation von
Radio waves presentationRadio waves presentation
Radio waves presentation04burkem
9.8K views9 Folien
Radio waves von
Radio wavesRadio waves
Radio wavessamwallis93
8.2K views8 Folien

Destacado(16)

network security, cryptography,steganography von Nikhil l
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
Nikhil l4.4K views
Radio waves presentation von 04burkem
Radio waves presentationRadio waves presentation
Radio waves presentation
04burkem9.8K views
Radio waves ppt von Niall Byrne
Radio waves pptRadio waves ppt
Radio waves ppt
Niall Byrne19.2K views
Intrusion detection system von Aparna Bhadran
Intrusion detection systemIntrusion detection system
Intrusion detection system
Aparna Bhadran12.9K views
Radio Waves von Sashwaah
Radio WavesRadio Waves
Radio Waves
Sashwaah17.3K views
Network security ppt von shashi712
Network security pptNetwork security ppt
Network security ppt
shashi7124.4K views
Radio waves presentation von R_elsbeth
Radio waves presentationRadio waves presentation
Radio waves presentation
R_elsbeth12.2K views
Wireless networking von Online
Wireless networkingWireless networking
Wireless networking
Online 47.3K views
Routers.ppt von kirbadh
Routers.pptRouters.ppt
Routers.ppt
kirbadh69.4K views
Network Security and Cryptography von Adam Reagan
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan66.8K views

Similar a Wireless Device and Network level security

Wireless LAN Deployment Best Practices von
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
2.4K views86 Folien
Wireless Security von
Wireless SecurityWireless Security
Wireless SecuritysiDz
892 views32 Folien
Wi Fi Technology von
Wi Fi TechnologyWi Fi Technology
Wi Fi TechnologyAlok Pandey (AP)
826 views42 Folien
Securing the Use of Wireless Fidelity (WiFi) in Libraries von
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesPhilippine Association of Academic/Research Librarians
1.2K views51 Folien
Wireless Security Needs For Enterprises von
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
359 views4 Folien
Wireless Multimedia von
Wireless Multimedia Wireless Multimedia
Wireless Multimedia Radhwan Al-Jaki
1K views26 Folien

Similar a Wireless Device and Network level security(20)

Wireless LAN Deployment Best Practices von Michael Boman
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman2.4K views
Wireless Security von siDz
Wireless SecurityWireless Security
Wireless Security
siDz892 views
Wireless Security Needs For Enterprises von shrutisreddy
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy359 views
White paper - Building Secure Wireless Networks von Altaware, Inc.
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.709 views
Viable means using which Wireless Network Security can be Jeopardized von IRJET Journal
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal28 views
Analysis Of Security In Wireless Network von Steven Wallach
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
Steven Wallach2 views
Module 6 Wireless Network security von nikshaikh786
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
nikshaikh78687 views
Wireless+LAN+Technology+and+Security+Vulnerabilities von Yogesh Kumar
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar329 views
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks von Chema Alonso
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso9.3K views
Wireless security by mujajhid rana von Mujahid Rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
Mujahid Rana242 views
Security Issues of 802.11b von guestd7b627
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
guestd7b627392 views
Security Issues of IEEE 802.11b von Sreekanth GS
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
Sreekanth GS3.5K views
謝續平 von 9577601
謝續平謝續平
謝續平
9577601484 views

Más de Chetan Kumar S

Edge and Fog computing, a use-case prespective von
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
1.9K views27 Folien
Human Machine Interface for Enterprise Applications von
Human Machine Interface for Enterprise ApplicationsHuman Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise ApplicationsChetan Kumar S
376 views19 Folien
Edge Computing von
Edge ComputingEdge Computing
Edge ComputingChetan Kumar S
46.3K views22 Folien
How to start your IOT journey von
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journeyChetan Kumar S
237 views21 Folien
Computational Intelligence and Applications von
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and ApplicationsChetan Kumar S
3K views25 Folien
Applicability of Machine learning in computer networks von
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
1.8K views31 Folien

Más de Chetan Kumar S(9)

Edge and Fog computing, a use-case prespective von Chetan Kumar S
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
Chetan Kumar S1.9K views
Human Machine Interface for Enterprise Applications von Chetan Kumar S
Human Machine Interface for Enterprise ApplicationsHuman Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise Applications
Chetan Kumar S376 views
Computational Intelligence and Applications von Chetan Kumar S
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and Applications
Chetan Kumar S3K views
Applicability of Machine learning in computer networks von Chetan Kumar S
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
Chetan Kumar S1.8K views
blockchain and iot: Opportunities and Challanges von Chetan Kumar S
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challanges
Chetan Kumar S2.3K views
Augmented Reality: On a new powerful mobile computing platforms von Chetan Kumar S
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
Chetan Kumar S877 views
Trends In Telecommunication Services von Chetan Kumar S
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
Chetan Kumar S4.4K views

Wireless Device and Network level security

  • 1. Security at Device, Network & Server Levels QIP Short Term Course On Wireless  Security Chetan Kumar Shivakumar Protocol Engineering and Technology Unit, IISc. (Currently working at Alcatel Lucent India Limited) e-mail shivakumar.chetan@gmail.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17. Why do we need network security I can send mail to all news channels using wifi access from this building. No non-repudiation
  • 18. Why do we need network security I can get the passwords now sitting outside this building Internet Banking is so easy with WiFi at home Eves dropping
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.