WIRELESS SECURITY

advertisement
WIRELESS SECURITY
ASHIMA SOOD
PEYTON GREENE
OVERVIEW

History

Introduction to Wireless Networking

Wireless Network Security Methods

Securing Wireless Networks (Tips)

Conclusion
HISTORY
The first Wireless LAN (1971) when networking
technologies met radio communications at the
University of Hawaii as a research project called
ALOHANET, under the leadership of Norman
Abramson.
 The bi-directional star topology of the system
included 7 computers deployed over 4 islands to
communicate with the central computer on the
Oahu Island without using phone lines.
 And so, wireless technology, as we know it, began
its journey into every house, classroom, and
business around the world.

WHAT IS A WIRELESS NETWORK?

Wireless networks utilize high frequency radio
waves and/or microwaves instead of copper
and/or fiber optic cabling (as in case of wired
technology), to maintain communication channels
between network devices.
PROS & CONS OF WIRELESS NETWORKING

Pros
Mobility
 Elimination of unsightly wires
 Thus, convenient and easy to use


Cons
Potential for radio interference due to weather, other
wireless devices, or obstructions like walls.
 Susceptible to security violations
 Requires more user knowledge

WIRELESS NETWORK SECURITY METHODS

Wired Equivalent Privacy (WEP)
Older method, still available to support older devices
 No longer recommended
 The network security key used encrypts the
information that one computer sends to another
computer across your network
 However, WEP security is relatively easy to crack

WIRELESS NETWORK SECURITY METHODS
(CONTD.)

Wi-Fi Protected Access (WPA)
Besides encrypting information, makes sure that the
network security key has not been modified.
 Authenticates users to help ensure that only authorized
people can access the network
 Version:

WPA: Initial WPA version, to supply enhanced security over
the older WEP protocol
 WPA2: Successor of WPA, and replaces TKIP encryption
protocol with CCMP to provide additional security


Target Users (authentication key distribution)
WPA-Personal: designed for home and small office networks
and doesn’t require an authentication server
 WPA-Enterprise: designed for enterprise networks, and
requires a RADIUS authentication server

WIRELESS NETWORK SECURITY METHODS
(CONTD.)

802.1X authentication
Can help enhance security for 802.11 wireless
networks and wired networks
 Uses an authentication server to validate users and
provide network access
 On wireless networks, 802.11X can work with WEP
or WPA keys
 Typically used when connecting to a workplace
network

WHY DOES IT MATTER?

Unencrypted networks can expose your system to
hackers and they can have access to:





Websites you visit
Emails you send and receive
Files you send over the network
FTP logins and files
Instant Messaging Communication
SECURING WIRELESS NETWORKS
Change Default Administrator Passwords(and
Usernames)
 Use a strong password
 Change the default SSID and disable its
broadcast
 Use good wireless encryption
 Upgrade your network adaptor top one that
works with WPA or WPA2
 Use another layer of encryption when
possible(like SSH)

SECURING WIRELESS NETWORKS (CONTD.)
Enable MAC address filtering
 Do not auto-connect to open Wi-Fi Networks
 Assign Static IP Addresses to Devices
 Enable Firewalls On Each Computer and the
Router
 Position the Router or Access Point Safely
 Turn Off the Network During Extended Periods
of Non-Use

CONCLUSION
Risks are inherent in any wireless technology,
but is still better than the wired technology
 Security is most important, so use the best
protection
 WPA2 with AES is currently the most secure
encryption method
 Enable any additional security measures to
secure your wireless network

REFERENCES
http://compnetworking.about.com/cs/wireless/f/wh
atiswireless.htm
 http://en.wikipedia.org/wiki/Wireless_security
 http://en.wikipedia.org/wiki/Wireless_LAN_securi
ty#Security_options
 http://en.wikipedia.org/wiki/WiFi_Protected_Access
 http://windows.microsoft.com/en-US/windowsvista/What-are-the-different-wireless-networksecurity-methods
 http://www.computerencryption.com/2009/05/what-wifi-hackers-cansee-580.html

Download