SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Wireless Ethernet
802.11 Presentation 3




                        1
How do we make a buck with
802.11
 Setup secured hot spots for client access.
  Sales force that is constantly mobile.
  Wireless internet service Provider.
 Working with communities to offer free
  WiFi.
 Combining Office networks to share one
  connection.
 Implementation of sound security for
  users. Consult and configure network
  security.

                                               2
802.11 Offers
   Roaming freedom
    ◦ No longer constrained to the office
    ◦ Smaller devices now have same function as
      laptops and tablets
    ◦ Never have to worry about access to external
      and internal network resources.
    ◦ Real Time Data Updates – Workers in the field
      can receive information in real-time.
    ◦ High Speed Data Transmission – Very close to
      LAN speeds and faster then Dial up.

                                                      3
802.11 Security and Privacy




                              4
Authentication and privacy
     Goal: to prevent unauthorized access & eavesdropping
     Realized by authentication service prior access
     Open system authentication
       ◦ station wanting to authenticate sends authentication
         management frame - receiving station sends back frame
         for successful authentication
     Shared key authentication (included in WEP*)
       ◦ Secret, shared key received by all stations by a separate,
         802.11 independent channel
       ◦ Stations authenticate by a shared knowledge of the key
         properties
     WEP’s privacy (blocking out eavesdropping) is based on
      ciphering:




                                                                       5
                                      *WEP: Wired Equivalent Privacy
802.11 Wired Encryption Protocol
    Part of 802.11 specification
    Shared key – 40/104 bits
    Initialization vector (IV) = 24 bits
    Uses RC4 for encryption
    WEP2 added, increases key length to 128 bits




http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif
http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif

                                                                               6
802.1x Access Control
•   Designed as a general purpose network access control
    mechanism
    • Not Wi-Fi specific
• Authenticate each client connected to AP (for WLAN) or switch
  port (for Ethernet)
• Authentication is done with the RADIUS server, which ”tells”
  the access point whether access to controlled ports should be
  allowed or not
    • AP forces the user into an unauthorized state
    • user send an EAP start message
    • AP return an EAP message requesting the user’s identity
    • Identity send by user is then forwared to the authentication server
      by AP
    • Authentication server authenticate user and return an accept or
      reject message back to the AP
    • If accept message is return, the AP changes the client’s state to
      authorized and normal traffic flows



                                                                            7
802.1x Access Control




                        8
Wireless Protected Access
(WPA)
•   WPA is a specification of standard based, interoperable
    security enhancements that strongly increase the level of data
    protection and access control for existing and future wireless
    LAN system.
•   User Authentication
    • 802.1x
    • EAP
•   TKIP (Temporal Key Integrity Protocol) encryption
    • RC4, dynamic encryption keys (session based)
      • 48 bit IV
      • per packet key mixing function
    • Fixes all issues found from WEP
•   Uses Message Integrity Code (MIC) Michael
    • Ensures data integrity



                                                                 9

Weitere ähnliche Inhalte

Was ist angesagt?

DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’tskieranjacobsen
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
Wireless network security
Wireless network securityWireless network security
Wireless network securityVishal Agarwal
 
IP Module Info Sheet nc
IP Module Info Sheet ncIP Module Info Sheet nc
IP Module Info Sheet ncRoy Thomson
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkRobb Boyd
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol SecurityDavid Barker
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerKHNOG
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)Robb Boyd
 
Azure Network and Infrastructure
Azure Network and InfrastructureAzure Network and Infrastructure
Azure Network and InfrastructurePhi Huynh
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012Alex de Jong
 

Was ist angesagt? (20)

DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’ts
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
IP Module Info Sheet nc
IP Module Info Sheet ncIP Module Info Sheet nc
IP Module Info Sheet nc
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
TekWifi Readme
TekWifi ReadmeTekWifi Readme
TekWifi Readme
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
Belkinslide
BelkinslideBelkinslide
Belkinslide
 
Azure Network and Infrastructure
Azure Network and InfrastructureAzure Network and Infrastructure
Azure Network and Infrastructure
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
 

Andere mochten auch

82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
82   jan-roger linna - 6913005 - system and methodology for purging fuel from...82   jan-roger linna - 6913005 - system and methodology for purging fuel from...
82 jan-roger linna - 6913005 - system and methodology for purging fuel from...Mello_Patent_Registry
 
クロームインストール8
クロームインストール8クロームインストール8
クロームインストール8support Kato
 
урок 8. единицы измерения информации
урок 8. единицы измерения информацииурок 8. единицы измерения информации
урок 8. единицы измерения информацииОльга Тигунцева
 
Моя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир ДенисМоя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир Денисsch426media
 
일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)  일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27) kwwa
 
Андрей Юнисов
Андрей ЮнисовАндрей Юнисов
Андрей ЮнисовOntico
 
Моя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков КириллМоя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков Кириллsch426media
 
Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Business incubator HSE
 
ใบงานหน่วยที่8
ใบงานหน่วยที่8ใบงานหน่วยที่8
ใบงานหน่วยที่8Amnuay
 
8.ανασκοπηση αποχαιρετισμος
8.ανασκοπηση  αποχαιρετισμος8.ανασκοπηση  αποχαιρετισμος
8.ανασκοπηση αποχαιρετισμοςmaradask
 
820107145132....hbpe2103
820107145132....hbpe2103820107145132....hbpe2103
820107145132....hbpe2103'Muliana Dasrun
 
קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14eshaki
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 
8 27 session 2
8 27 session 28 27 session 2
8 27 session 2nblock
 

Andere mochten auch (20)

82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
82   jan-roger linna - 6913005 - system and methodology for purging fuel from...82   jan-roger linna - 6913005 - system and methodology for purging fuel from...
82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
 
クロームインストール8
クロームインストール8クロームインストール8
クロームインストール8
 
урок 8. единицы измерения информации
урок 8. единицы измерения информацииурок 8. единицы измерения информации
урок 8. единицы измерения информации
 
Моя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир ДенисМоя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир Денис
 
801tecinformaticaiip
801tecinformaticaiip801tecinformaticaiip
801tecinformaticaiip
 
일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)  일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)
 
811288 slides
811288 slides811288 slides
811288 slides
 
Андрей Юнисов
Андрей ЮнисовАндрей Юнисов
Андрей Юнисов
 
απλή αρμονική ταλάντωση8
απλή αρμονική ταλάντωση8απλή αρμονική ταλάντωση8
απλή αρμονική ταλάντωση8
 
8.2.1measure
8.2.1measure8.2.1measure
8.2.1measure
 
Моя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков КириллМоя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков Кирилл
 
Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8
 
ใบงานหน่วยที่8
ใบงานหน่วยที่8ใบงานหน่วยที่8
ใบงานหน่วยที่8
 
看護管理8月号2011
看護管理8月号2011看護管理8月号2011
看護管理8月号2011
 
8.ανασκοπηση αποχαιρετισμος
8.ανασκοπηση  αποχαιρετισμος8.ανασκοπηση  αποχαιρετισμος
8.ανασκοπηση αποχαιρετισμος
 
82 gcps-2010 tto vih
82 gcps-2010 tto vih82 gcps-2010 tto vih
82 gcps-2010 tto vih
 
820107145132....hbpe2103
820107145132....hbpe2103820107145132....hbpe2103
820107145132....hbpe2103
 
קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
8 27 session 2
8 27 session 28 27 session 2
8 27 session 2
 

Ähnlich wie 802 11 3

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxAmanuelZewdie4
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?Tom Isaacson
 

Ähnlich wie 802 11 3 (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Iuwne10 S04 L02
Iuwne10 S04 L02Iuwne10 S04 L02
Iuwne10 S04 L02
 

Mehr von rphelps

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Eventrphelps
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connectrphelps
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staffrphelps
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencingrphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 

Mehr von rphelps (6)

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Event
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connect
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staff
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencing
 
802 11 2
802 11 2802 11 2
802 11 2
 
802 11 2
802 11 2802 11 2
802 11 2
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

802 11 3

  • 2. How do we make a buck with 802.11  Setup secured hot spots for client access. Sales force that is constantly mobile. Wireless internet service Provider.  Working with communities to offer free WiFi.  Combining Office networks to share one connection.  Implementation of sound security for users. Consult and configure network security. 2
  • 3. 802.11 Offers  Roaming freedom ◦ No longer constrained to the office ◦ Smaller devices now have same function as laptops and tablets ◦ Never have to worry about access to external and internal network resources. ◦ Real Time Data Updates – Workers in the field can receive information in real-time. ◦ High Speed Data Transmission – Very close to LAN speeds and faster then Dial up. 3
  • 5. Authentication and privacy  Goal: to prevent unauthorized access & eavesdropping  Realized by authentication service prior access  Open system authentication ◦ station wanting to authenticate sends authentication management frame - receiving station sends back frame for successful authentication  Shared key authentication (included in WEP*) ◦ Secret, shared key received by all stations by a separate, 802.11 independent channel ◦ Stations authenticate by a shared knowledge of the key properties  WEP’s privacy (blocking out eavesdropping) is based on ciphering: 5 *WEP: Wired Equivalent Privacy
  • 6. 802.11 Wired Encryption Protocol  Part of 802.11 specification  Shared key – 40/104 bits  Initialization vector (IV) = 24 bits  Uses RC4 for encryption  WEP2 added, increases key length to 128 bits http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif 6
  • 7. 802.1x Access Control • Designed as a general purpose network access control mechanism • Not Wi-Fi specific • Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) • Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not • AP forces the user into an unauthorized state • user send an EAP start message • AP return an EAP message requesting the user’s identity • Identity send by user is then forwared to the authentication server by AP • Authentication server authenticate user and return an accept or reject message back to the AP • If accept message is return, the AP changes the client’s state to authorized and normal traffic flows 7
  • 9. Wireless Protected Access (WPA) • WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • EAP • TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • per packet key mixing function • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) Michael • Ensures data integrity 9