WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless Networks (Tips) Conclusion HISTORY The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson. The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines. And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world. WHAT IS A WIRELESS NETWORK? Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices. PROS & CONS OF WIRELESS NETWORKING Pros Mobility Elimination of unsightly wires Thus, convenient and easy to use Cons Potential for radio interference due to weather, other wireless devices, or obstructions like walls. Susceptible to security violations Requires more user knowledge WIRELESS NETWORK SECURITY METHODS Wired Equivalent Privacy (WEP) Older method, still available to support older devices No longer recommended The network security key used encrypts the information that one computer sends to another computer across your network However, WEP security is relatively easy to crack WIRELESS NETWORK SECURITY METHODS (CONTD.) Wi-Fi Protected Access (WPA) Besides encrypting information, makes sure that the network security key has not been modified. Authenticates users to help ensure that only authorized people can access the network Version: WPA: Initial WPA version, to supply enhanced security over the older WEP protocol WPA2: Successor of WPA, and replaces TKIP encryption protocol with CCMP to provide additional security Target Users (authentication key distribution) WPA-Personal: designed for home and small office networks and doesn’t require an authentication server WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server WIRELESS NETWORK SECURITY METHODS (CONTD.) 802.1X authentication Can help enhance security for 802.11 wireless networks and wired networks Uses an authentication server to validate users and provide network access On wireless networks, 802.11X can work with WEP or WPA keys Typically used when connecting to a workplace network WHY DOES IT MATTER? Unencrypted networks can expose your system to hackers and they can have access to: Websites you visit Emails you send and receive Files you send over the network FTP logins and files Instant Messaging Communication SECURING WIRELESS NETWORKS Change Default Administrator Passwords(and Usernames) Use a strong password Change the default SSID and disable its broadcast Use good wireless encryption Upgrade your network adaptor top one that works with WPA or WPA2 Use another layer of encryption when possible(like SSH) SECURING WIRELESS NETWORKS (CONTD.) Enable MAC address filtering Do not auto-connect to open Wi-Fi Networks Assign Static IP Addresses to Devices Enable Firewalls On Each Computer and the Router Position the Router or Access Point Safely Turn Off the Network During Extended Periods of Non-Use CONCLUSION Risks are inherent in any wireless technology, but is still better than the wired technology Security is most important, so use the best protection WPA2 with AES is currently the most secure encryption method Enable any additional security measures to secure your wireless network REFERENCES http://compnetworking.about.com/cs/wireless/f/wh atiswireless.htm http://en.wikipedia.org/wiki/Wireless_security http://en.wikipedia.org/wiki/Wireless_LAN_securi ty#Security_options http://en.wikipedia.org/wiki/WiFi_Protected_Access http://windows.microsoft.com/en-US/windowsvista/What-are-the-different-wireless-networksecurity-methods http://www.computerencryption.com/2009/05/what-wifi-hackers-cansee-580.html