SlideShare ist ein Scribd-Unternehmen logo
1 von 5
   War Driving
    ◦ Driving around scanning for unsecured networks to gain free Internet access or access network hosts
      and resources. Just because you can, does not mean its legal or ethical to do so
   Hackers (Crackers)
    ◦ Exploiting weak security measures (such as WEP and defaults) to gain access with malicious intent
   Rogue Access Points
    ◦ An access point installed by an employee (or contractor) without authorisation. Typically does not
      conform to enterprise security policy or configurations and becomes a weak link.
   Man in Middle Attack
    ◦ Software can be used to capture wireless traffic such as authentication and association requests.
      Security keys can be discovered and used for malicious activity
    ◦ Counter with intrusion prevention systems that monitor the RF band and scan for rogue access
      points, ad-hoc connections and other activity
   DOS Denial of Service
    ◦ Signal interference from sources such as cordless phones, microwaves can cause noise on channels
      and prevent frames from reaching their destinations
    ◦ Flooding the BSS with CTS or disassociate messages which cause collisions and disrupt operations
   WEP
    ◦ Wired Equivalent Privacy which uses a WEP key as the secret and RC4 as the
      cipher to encrypt the data
    ◦ WEP was the first standard. The WEP key can now be easily discovered using a
      tool.
    ◦ This method should NO LONGER be used
   WPA
    ◦ WIFI protected access based on the draft 802.11i standard
    ◦ Interim security standard while developing WPA 2
   WPA2
    ◦ WIFI protected access 2 that implements the ratified 802.11i standard
    ◦ This is the current security standard used to certify new devices
   WPS
    ◦ WiFI Protected Setup was intended to simplify security with a push button and
      pin.
    ◦ Major security flaw discovered late 2011 and this method should be disabled
   802.1x /EAP extensions
    ◦ A method that keeps wireless logical ports closed until the user authenticates.
      (not covered here – its in the Diploma course)
   WiFi Protected Access
    ◦ WiFi alliance security certified protocol
    ◦ Interim protocol while IEEE 802.11i standard developed
   Uses the TKIP Temporal Key Integrity Protocol
    ◦ TKIP uses the RC4 cipher (which WEP uses)
    ◦ 3 features added to fix the flaws in WEP and prevent discovery
      of the secret key
    ◦ Michael – MIC message integrity code to prevent tampering and
      replay attacks
      MIC – message integrity code added to the frame and encrypted
       with the data
      A replay attack captures an authentication exchange and attempts to
       resend the packets at a later time to get access without knowing the
       key
   WiFi Protected Access 2
    ◦ WPA 2 implements the IEEE 802.11i security standard but is certified
      and tested as WPA2
   WPA2 implements
    ◦ TKIP as the key management protocol for older devices
    ◦ Michael message integrity code (MIC)
    ◦ Uses CCMP encryption protocol with a new cipher: AES Advanced
      Encryption Standard
       AES requires AES capable hardware, TKIP is used for encryption for older
        equipment
   Authentication methods
    ◦ Pre-shared Key PSK
    ◦ Enterprise (EAP/Radius/TLS protocols) which do not allow data frames
      through the AP port until the user has successfully authenticated.
                  This can be integrated with Active Directory network accounts
   WiFi Protected Setup
    ◦ Created to allow easy security setup for adding new devices to
      the Wlan
    ◦ Uses a PIN, Push button, near field communications or USB
      configuration transfer
    ◦ Can be broken easily by brute-force attack (Dec 2011)
   Solution
    ◦ Disable WPS by applying a firmware update

Weitere ähnliche Inhalte

Was ist angesagt?

Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slidesguest1c1a9a
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and functionNisarg Amin
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless securityrash2kool
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter newKarnav Rana
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarNasir Bhutta
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentalsThang Man
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filtersMOHIT AGARWAL
 

Was ist angesagt? (20)

Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Firewall and its purpose
Firewall and its purposeFirewall and its purpose
Firewall and its purpose
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Firewalls
FirewallsFirewalls
Firewalls
 
wifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slideswifi-y3dips-stmik_mdp_slides
wifi-y3dips-stmik_mdp_slides
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Firewall girija ppt
Firewall girija pptFirewall girija ppt
Firewall girija ppt
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall and its types and function
Firewall and its types and functionFirewall and its types and function
Firewall and its types and function
 
Tingling wireless security
Tingling wireless securityTingling wireless security
Tingling wireless security
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Types Of Firewall Security
Types Of Firewall SecurityTypes Of Firewall Security
Types Of Firewall Security
 
Cyber Security: Trends and Globar War
Cyber Security: Trends and Globar WarCyber Security: Trends and Globar War
Cyber Security: Trends and Globar War
 
LAN Security
LAN Security LAN Security
LAN Security
 
Vpn presnt
Vpn presntVpn presnt
Vpn presnt
 
Firewall fundamentals
Firewall fundamentalsFirewall fundamentals
Firewall fundamentals
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 

Andere mochten auch

Security In Dect
Security In DectSecurity In Dect
Security In DectMarc Seeger
 
Ieee 2016 Network Security Papers Trichy
Ieee 2016 Network Security Papers TrichyIeee 2016 Network Security Papers Trichy
Ieee 2016 Network Security Papers Trichykrish madhi
 
2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network SecurityManju Nath
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture InnoTech
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research PaperPankaj Jha
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentationriddhikapandya1985
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

Andere mochten auch (11)

Security In Dect
Security In DectSecurity In Dect
Security In Dect
 
Ieee 2016 Network Security Papers Trichy
Ieee 2016 Network Security Papers TrichyIeee 2016 Network Security Papers Trichy
Ieee 2016 Network Security Papers Trichy
 
2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security2015 and 2016 IEEE Projects for Network Security
2015 and 2016 IEEE Projects for Network Security
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Network security
Network security Network security
Network security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Thesis Power Point Presentation
Thesis Power Point PresentationThesis Power Point Presentation
Thesis Power Point Presentation
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Ähnlich wie Security standard

Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measureShivam Singh
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected accessLopamudra Das
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Mohammad Fareed
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network securitynikshaikh786
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Ähnlich wie Security standard (20)

Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless security
Wireless securityWireless security
Wireless security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Mehr von lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Logging
LoggingLogging
Logginglyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Capacity
CapacityCapacity
Capacitylyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

Mehr von lyndyv (17)

Datarate
DatarateDatarate
Datarate
 
Logging
LoggingLogging
Logging
 
Policy
PolicyPolicy
Policy
 
Capacity
CapacityCapacity
Capacity
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Security standard

  • 1. War Driving ◦ Driving around scanning for unsecured networks to gain free Internet access or access network hosts and resources. Just because you can, does not mean its legal or ethical to do so  Hackers (Crackers) ◦ Exploiting weak security measures (such as WEP and defaults) to gain access with malicious intent  Rogue Access Points ◦ An access point installed by an employee (or contractor) without authorisation. Typically does not conform to enterprise security policy or configurations and becomes a weak link.  Man in Middle Attack ◦ Software can be used to capture wireless traffic such as authentication and association requests. Security keys can be discovered and used for malicious activity ◦ Counter with intrusion prevention systems that monitor the RF band and scan for rogue access points, ad-hoc connections and other activity  DOS Denial of Service ◦ Signal interference from sources such as cordless phones, microwaves can cause noise on channels and prevent frames from reaching their destinations ◦ Flooding the BSS with CTS or disassociate messages which cause collisions and disrupt operations
  • 2. WEP ◦ Wired Equivalent Privacy which uses a WEP key as the secret and RC4 as the cipher to encrypt the data ◦ WEP was the first standard. The WEP key can now be easily discovered using a tool. ◦ This method should NO LONGER be used  WPA ◦ WIFI protected access based on the draft 802.11i standard ◦ Interim security standard while developing WPA 2  WPA2 ◦ WIFI protected access 2 that implements the ratified 802.11i standard ◦ This is the current security standard used to certify new devices  WPS ◦ WiFI Protected Setup was intended to simplify security with a push button and pin. ◦ Major security flaw discovered late 2011 and this method should be disabled  802.1x /EAP extensions ◦ A method that keeps wireless logical ports closed until the user authenticates. (not covered here – its in the Diploma course)
  • 3. WiFi Protected Access ◦ WiFi alliance security certified protocol ◦ Interim protocol while IEEE 802.11i standard developed  Uses the TKIP Temporal Key Integrity Protocol ◦ TKIP uses the RC4 cipher (which WEP uses) ◦ 3 features added to fix the flaws in WEP and prevent discovery of the secret key ◦ Michael – MIC message integrity code to prevent tampering and replay attacks  MIC – message integrity code added to the frame and encrypted with the data  A replay attack captures an authentication exchange and attempts to resend the packets at a later time to get access without knowing the key
  • 4. WiFi Protected Access 2 ◦ WPA 2 implements the IEEE 802.11i security standard but is certified and tested as WPA2  WPA2 implements ◦ TKIP as the key management protocol for older devices ◦ Michael message integrity code (MIC) ◦ Uses CCMP encryption protocol with a new cipher: AES Advanced Encryption Standard  AES requires AES capable hardware, TKIP is used for encryption for older equipment  Authentication methods ◦ Pre-shared Key PSK ◦ Enterprise (EAP/Radius/TLS protocols) which do not allow data frames through the AP port until the user has successfully authenticated.  This can be integrated with Active Directory network accounts
  • 5. WiFi Protected Setup ◦ Created to allow easy security setup for adding new devices to the Wlan ◦ Uses a PIN, Push button, near field communications or USB configuration transfer ◦ Can be broken easily by brute-force attack (Dec 2011)  Solution ◦ Disable WPS by applying a firmware update