Wi-Fi Client Device Security & HIPAA Compliance
|
|
|
- Roger Stewart
- 10 years ago
- Views:
Transcription
1 Wi-Fi Client Device Security & HIPAA Compliance Originally Published: September 2010 Updated: October 2012 A White Paper from Laird Technologies Connecting medical devices to a hospital s Wi-Fi network improves workflow on both the clinical path and the financial path. With networked devices, a hospital delivers better care to more patients while billing those patients, and their insurance companies, quickly and accurately. Networking medical devices also enables technicians to monitor and manage those devices from a central point of control. Americas: Option 3 Europe: Hong Kong: x026
2 Contents Executive Summary... 2 Wi-Fi in Hospitals... 2 HIPAA: Protecting Health Information... 2 Threats When Wi-Fi Security Is Weak... 4 Wi-Fi Security Foundation: WPA2-Enterprise... 5 WPA... 5 Personal vs. Enterprise... 6 TKIP: Vulnerable?... 7 WPA Connect Only to Trusted APs... 9 Protect Authentication Credentials... 9 Summary: Security Best Practices for Wi-Fi Client Devices WiFi_Client_Security_and_HIPAA_wp_201210
3 EXECUTIVE SUMMARY Wi-Fi in Hospitals According to ABI Research, the use of wireless local area networking (WLAN) technology in healthcare grew 60% globally in Worldwide sales of WLAN, or Wi-Fi, technology into the healthcare market are expected to reach $4.9 billion in More than 500,000 Wi-Fi infrastructure endpoints, or access points (APs), are expected to be implemented in U.S. healthcare facilities in 2010, representing a 50% increase from Even though Wi-Fi offers many potential benefits, a hospital will not rely on Wi-Fi unless the hospital has confidence that its Wi-Fi networks and devices will protect sensitive information, including electronic medical records (EMRs), which are transmitted over Wi-Fi or stored on networks that can be accessed through Wi-Fi. This white paper provides Wi-Fi client security best practices that protect the data that Wi-Fi clients transmit and receive and the networks to which those clients connect. HIPAA: PROTECTING HEALTH INFORMATION According to the Web site for the U.S. Department of Health and Human Services (HHS), the Health Insurance Portability and Accountability Act of 1996 (HIPAA) required the HHS Secretary to develop regulations protecting the privacy and security of certain health information. To fulfill this requirement, HHS published two documents: 1. The HIPAA Privacy Rule, which establishes national standards for health information protection 2. The HIPAA Security Rule, which establishes a national set of security standards for organizations that handle protected health information that is held or transferred in electronic form. The Security Rule seeks to protect the privacy of individuals health information while allowing covered entities to adopt new technologies to improve the quality and efficiency of patient care. The Security Rule is found in the Code of Federal Regulations (CFR) Title 45, Part 164, Subpart C, entitled Security Standards for the Protection of Electronic Protected Health Information. The sections of Subpart C are shown at the right. For Wi-Fi client devices and networks, the key part of Subpart C is section , which lists technical safeguards. The section includes five standards and, for three of the standards, a set of implementation specifications or guidelines. Each guideline is either required (R) or addressable (A). Subpart C Security Standards for the Protection of Electronic Protected Health Information Applicability Definitions Security standards: General rules Administrative safeguards (a)(1) Security Management Process (a)(2) Assigned Security Responsibility (a)(3) Workforce Security (a)(4) Information Access Management (a)(5) Security Awareness and Training (a)(6) Security Incident Procedures (a)(7) Contingency Plan (a)(8) Evaluation (b)(1) Business Associate Contracts Physical safeguards (a)(1) Facility Access Controls (b) Workstation Use (c) Workstation Security (d)(1) Device and Media Controls Technical safeguards (a)(1) Access Control (b) Audit Controls (R) (c)(1) Integrity (d) Person or Entity Authentication (R) (e)(1) Transmission Security Organizational requirements Policies, procedures, documentation Compliance dates (R) required (A) addressable 2 WiFi_Client_Security_and_HIPAA_wp_201210
4 Error! Reference source not found. provides details on Table 1: of HIPAA Security Rule (a) Access control: Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in (a)(4). Implementation guidelines: (i) Unique user identification (R): Assign a unique name and/or number for identifying and tracking user identity. (ii) Emergency access procedure (R): Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency. (iii) Automatic logoff (A): Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. (iv) Encryption and decryption (A): Implement a mechanism to encrypt and decrypt electronic protected health information. (b) Audit controls. Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. (c) Integrity. Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. Implementation guidelines: Mechanism to authenticate electronic protected health information (A): Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner. (d) Person or entity authentication. Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed. (e) Transmission security: Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. Implementation guidelines: (i) Integrity controls (A): Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of. (ii) Encryption (A): Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate. To satisfy the requirements of HIPAA, a hospital Wi-Fi system needs: Strong, mutual authentication between every authorized client device and a trusted hospital network to ensure that: - Only trusted Wi-Fi clients can gain network access - Trusted Wi-Fi clients are not tricked into connecting to an untrusted network Strong encryption of all data, especially protected health information, that is transmitted between a Wi-Fi client and the hospital network Before looking at the type of Wi-Fi security that satisfies HIPAA requirements, let s consider the threats to sensitive information when Wi-Fi security is not as strong as it should be. 3 WiFi_Client_Security_and_HIPAA_wp_201210
5 THREATS WHEN WI-FI SECURITY IS WEAK Wi-Fi involves communication between radios that use a specific type of radio frequency (RF) technology. Wi- Fi radios send data to each other over the air, using radio waves. In a hospital, Wi-Fi radios in computing devices communicate with Wi-Fi radios in infrastructure devices such as access points (APs) that are connected to the hospital s wired network. The radio waves that travel between the devices can reach waiting rooms and other public areas and even bleed through the walls of the hospital to parking lots and other nearby areas. Those RF signals can be viewed by a computing device that is hundreds of meters from the sending and receiving stations, provided that the computing device is equipped with the following: A Wi-Fi radio An antenna that provides sufficient gain to enable the radio to hear the Wi-Fi packets A commonly available software application called a Wi-Fi sniffer, which makes the contents of Wi-Fi packets viewable Without proper Wi-Fi security in place, a hacker can use intercepted Wi-Fi packets to do one or more of the following: gain access to the WLAN, view sensitive information that is transmitted over the air, or trick users into communicating with the hacker instead of the network. The first threat of weak Wi-Fi security is network exposure. Control packets travel between Wi-Fi clients and a WLAN. When WLAN access is not governed by a strong authentication mechanism, then a hacker can use the control information in sniffed packets to pose as an authorized user and gain access to the WLAN. Once on the WLAN, the hacker may be able to gain access to sensitive information on the network. Figure 1: Wi-Fi security threats The second threat of weak Wi-Fi security is data exposure. Some of the data packets that travel between a Wi-Fi client and a WLAN may contain sensitive information. If the packets are not scrambled, or encrypted, so that they cannot be deciphered by a hacker, then the hacker can view sensitive information, such as credit card information, just by sniffing and viewing the packets. The third threat of weak Wi-Fi security is man-in-the-middle attacks. When Wi-Fi clients are not required to use strong authentication methods, a hacker s laptop, posing as an AP, may be able to trick clients into associating with it instead of a trusted AP. Once a Wi-Fi client associates to a hacker s laptop, the hacker may be able to steal information from the client, including sensitive information and information required to gain access to the trusted network. 4 WiFi_Client_Security_and_HIPAA_wp_201210
6 WI-FI SECURITY FOUNDATION: WPA2-ENTERPRISE Fortunately, WLAN security threats can be mitigated through good WLAN security practices. The foundation of any WLAN security approach should be the Enterprise version of Wi-Fi Protected Access 2, or WPA2. In the early 2000s, as Wi-Fi became popular on mainstream client devices such as laptops, it was determined that the original WLAN security mechanism of Wired Equivalent Privacy (WEP) was insufficient for several reasons, including: No access control: While it defines a means to scramble, or encrypt, transmitted data, WEP provides no means to control access to a WLAN. If you know the WEP encryption key, then you can gain access to the WLAN. Vulnerable keys: Due to weaknesses in WEP, a hacker can crack or decipher a WEP key by collecting WEP-encrypted data packets and running them through a WEP-cracking tool. Today, using sophisticated tools, even a 104-bit WEP key can be cracked in less than an hour. Static keys: The only way to avoid the use of a WEP key that has been cracked by a hacker is to change all WEP keys regularly, which today means more frequently than every hour. Because the most common way of deploying WEP keys is to define them statically on all devices that used them, changing WEP keys is an administrative nightmare. The IEEE, which defines the standards for WLANs and how they operate, formed a task group, called the i task group, to define a standard for stronger WLAN security. The i task group, like most other IEEE task groups, took several years to define, debate, finalize, and ratify the standard. In the meantime, the market grew increasingly impatient for something better than WEP. WPA The Wi-Fi Alliance, a non-profit industry association of more than 300 member companies, responded to market pressure by teaming with the i task group to create WPA, which the Alliance termed a significant near-term enhancement to Wi-Fi security. According to the Alliance, WPA is a specification of standards-based, interoperable security enhancements that ensures data protection through encryption and WLAN access control through authentication. WPA was designed to be supported in software by Wi-Fi CERTIFIED products that previously had supported WEP. There are two versions of WPA: Personal and Enterprise. Each defines a process for mutual authentication between the Wi-Fi client and the WLAN infrastructure. At the end of the authentication process, a key is derived dynamically from the information exchanged between the client and the infrastructure. After the authentication process completes, the derived key is used to encrypt and decrypt all unicast data that travels between the client and the infrastructure. 5 WiFi_Client_Security_and_HIPAA_wp_201210
7 Personal vs. Enterprise With WPA-Personal, authentication is done through a four-way handshake using a pre-shared key (PSK) or passphrase. If the PSK on the Wi-Fi client matches the PSK on the AP to which the client is trying to associate, then the authentication succeeds, and an encryption key for that client is derived and stored on the client and the AP. While WPA-Personal authentication relies on a statically configured PSK or passphrase, WPA-Enterprise authentication relies on IEEE 802.1X, a ratified standard for network access control X supports a set of Extensible Authentication Protocol, or EAP, types for mutual authentication of the client device and the network to which it is trying to connect X authentication with an EAP type, such as PEAP or EAP-TLS, is extremely strong. If WPA-Enterprise authentication succeeds, then an encryption key for the client is derived and stored on the client and the AP. Table 2 compares popular EAP types that are used with 802.1X authentication: Table 2: Comparison of popular EAP types Type Credential(s) Database(s) Pros and Cons LEAP Microsoft password Active Directory (AD) PEAP with EAP- MSCHAP PEAP with EAP- GTC No certificates Strong password required Microsoft password AD Native support in Windows, CE Password, one-time password, token AD, NDS, LDAP, OTP database CA certificate on every client device Broad range of credentials CA certificate on every client device EAP-TTLS Wide variety Wide variety Broad range of credentials EAP-FAST Microsoft password, others AD, others EAP-TLS Client certificate Certificate authority (CA) Not widely supported No certificates Complex provisioning process Very strong authentication Native support in Windows, CE CA, user certificates on every client device While PSKs are easy to implement on small networks, a hacker can guess a short PSK using a dictionary attack. In such an attack, the hacker captures packets that were created using the PSK and then, using a dictionary of potential PSKs and the published algorithm for WPA, tries to recreate the capture packets. If successful, then the hacker has determined the PSK and can use it to gain access to the WLAN. An online service runs a 20-minute attack using a dictionary of 135 million words for a cost of $17. To avoid vulnerability to a dictionary attack, your PSK or passphrase must be a random string of at least 20 characters, including characters other than letters and digits. Of course, such a random string is difficult, if not impossible, to remember, so it must be configured statically on every client device and every infrastructure device in one sitting. Configuring a few devices in a home or small office is feasible; configuring scores or hundreds of devices in a larger organization can be a huge challenge. For nearly every organization, the Enterprise version is superior to the Personal version. 6 WiFi_Client_Security_and_HIPAA_wp_201210
8 TKIP: Vulnerable? With WPA-Personal and WPA-Enterprise, encryption and decryption of all unicast data is done using Temporal Key Integrity Protocol, or TKIP. Like WEP, TKIP uses RC4 encryption, but TKIP is designed to address vulnerabilities of WEP by providing these enhancements: Longer initialization vector, which minimizes the chance that a key is reused during a session Key hashing, which results in a different key for each data packet Message integrity check, which ensures that the message is not altered in transit between sender and receiver In late 2008, two German researchers reported that a vulnerability in TKIP could enable an attacker to decrypt individual packets that are encrypted with TKIP. In mid-2009, two Japanese researchers reported that they had expanded on the German researchers work and devised a way to mount a successful attack on TKIP. The latter report received a lot of media attention, with some articles claiming that TKIP can be cracked in less than one minute. Summit has analyzed the paper published by the Japanese researchers and noted these highlights: The paper heavily leverages a paper written by German students in the fall of The new attack is simply a refined and practical version of a theoretical attack proposed by the German students. The attack described by the German students works only when the Wi-Fi router supports e. The approach by the Japanese scientists uses a man-in-the-middle (MITM) attack to overcome that limitation. Both attacks work with both the Personal and Enterprise versions of WPA because the attacks focus on encrypted packets and are oblivious to the authentication scheme that generates the encryption key used for TKIP. The attack by German students can obtain the message integrity check (MIC) key and the plain text of the packet from an encrypted ARP packet. The execution time of this attack is minutes. The attack by the Japanese scientists can obtain the same information from an encrypted ARP packet but in less time (reportedly as little as one minute) and without the restriction of e support on the router. Neither attack can decipher the TKIP encryption key. While the contents of an ordinary data packet are relatively unpredictable, all bytes of an ARP packet are fixed or known values except the last byte of the source and destination IP addresses. In other words, only two bytes of an ARP packet are unknown. The attack cracks those two bytes. It also cracks the eight bytes of the MIC and four bytes of the checksum by using an attack called chopchop 12 times. In summary, the Japanese researchers improved an existing attack that enables a tool to decrypt the unknown two bytes of an ARP packet as well as the MIC and checksum used in conjunction with TKIP. The researchers provided no evidence that a practical tool for cracking an actual TKIP key or deciphering TKIPencrypted data packets is imminent. The reports, however, were enough to sound the death toll for TKIP and WPA. Earlier this year, the Wi-Fi Alliance announced that it is phasing out TKIP, first on infrastructure devices and then on client devices. In fact, beginning the first day of 2011, TKIP is not optional but prohibited in APs except as a component of WPA2 with mixed mode. TKIP (and WEP) will be prohibited in any Wi-Fi CERTIFIED device beginning in With WPA s encryption method of TKIP rapidly moving from recommended to prohibited, organizations must adopt a stronger encryption method. 7 WiFi_Client_Security_and_HIPAA_wp_201210
9 WPA2 In July 2004, the IEEE approved the full i specification. Soon after that, the Wi-Fi Alliance introduced a new interoperability testing certification, called WPA2, which incorporates the key elements of i. WPA2 is essentially the same as WPA, with TKIP replaced by a stronger encryption method based on the Advanced Encryption Standard (AES) cipher. In March 2006, WPA2 certification became mandatory for all new equipment certified by the Wi-Fi Alliance. As with WPA, there are two versions of WPA2: Personal and Enterprise. With Personal, the process for authentication and dynamic key derivation relies on a PSK or passphrase; with Enterprise, the process relies on 802.1X. For the reasons discussed in the section on WPA, WPA2-Personal is insufficient for an organization with sensitive information such as cardholder data on its networks. Figure 2: WPA-Enterprise and WPA2-Enterprise As shown in Figure 2 above, the only difference between WPA-Enterprise and WPA2-Enterprise is the method of encryption. AES-CCMP, the encryption algorithm used with WPA2, does not have the vulnerabilities of TKIP. In fact, AES-CCMP is strong enough to satisfy the U.S. federal government encryption standard of FIPS By combining 802.1X and AES-CCMP, WPA2- Enterprise addresses the security threats mentioned earlier in this section: Network exposure: When every Wi-Fi client uses WPA2- Enterprise and its 802.1X authentication, a hacker cannot glean from sniffed packets any information on how to gain access to the network. Figure 3: WPA2-Enterprise and Wi-Fi security threats 8 WiFi_Client_Security_and_HIPAA_wp_201210
10 Data exposure: To prevent the data in Wi-Fi packets from being viewed by a hacker, the sender of those packets must encrypt the data in such a way that only the intended recipient can decrypt the packets and view the data in its unscrambled, clear-text form. WPA2-Enterprise provides proven mechanisms for ensuring that all transmitted data is protected from being viewed by a hacker. Man-in-the-middle attacks: When every Wi-Fi client is configured to use a strong EAP type for mutual authentication to the trusted WLAN, no client will associate inadvertently to a hacker s laptop that is posing as an AP. (See the discussion of requirement for details on configuring clients.) The use of WPA2-Enterprise protects all sensitive data, including credit card information, and the networks that house that data. Reliance on WPA2-Enterprise is a best practice for strong Wi-Fi security. Best practice: Ensure that a Wi-Fi client device can gain access to your WLANs only using WPA2-Enterprise with a strong EAP type. Connect Only to Trusted APs By default, WLAN devices are open, meaning that they have no security configured. To ensure that a client device uses WPA2-Enterprise, you must change that device s default configuration. On devices that run a version of Microsoft Windows, such as Windows Mobile or Windows 7, you can use a native WLAN configuration facility called Windows Zero Config (WZC). WZC supports the configuration of only two EAP types, PEAP with EAP-MSCHAPv2 as the inner method (PEAP-MSCHAP) and EAP-TLS. Many organizations rely on other EAP types such as EAP-TTLS, EAP-FAST, and PEAP-GTC because those types provide a better fit with infrastructure and security requirements. To use an EAP type that is not supported natively by the Windows operating systems, a client device must include a software application called an 802.1X supplicant that supports that EAP type. Supplicants are available for and are even bundled with devices that run Windows 7 or Windows XP. For devices that run another operating system, the Wi-Fi radio in the client device must include the supplicant. To simplify administration of Wi-Fi client devices, you should choose devices with software that supports a wide range of EAP types and ensures that the devices are configured to connect only to your trusted WLAN using your chosen EAP type. Ideally, this software will support a means to distribute the same configuration to many devices with minimal intervention. Best practice: Configure every trusted Wi-Fi client device to connect only to trusted APs. Protect Authentication Credentials Many hospitals try to prevent unauthorized users from having physical access to certain devices that can connect to the hospital network. Physical device security is rarely foolproof and Wi-Fi client devices sometimes fall into the wrong hands. Because a stolen device probably runs a limited set of applications, a thief will not typically use a stolen device to break into the WLAN and the resources behind it. Instead, the thief will copy WLAN configuration information from the stolen device to a specially configured laptop that can be used to hack into the in-scope WLAN and steal cardholder information. 9 WiFi_Client_Security_and_HIPAA_wp_201210
11 To limit threats from stolen Wi-Fi client devices, an organization should not store authentication credentials, such as a username and password, on a device. Instead, the organization should require a trusted user to enter a valid username and password at device startup. When authentication credentials are not stored on a stolen device, a thief cannot transfer those credentials to a hacking device. Best practice: Do not store WPA2 (EAP) authentication credentials on client devices. SUMMARY: SECURITY BEST PRACTICES FOR WI-FI CLIENT DEVICES The following best practices for Wi-Fi client device security and administration help to ensure HIPAA compliance: Ensure that a Wi-Fi client device can gain access to your WLANs only using WPA2-Enterprise with a strong EAP type. Configure every trusted Wi-Fi client device to connect only to trusted APs. Do not store EAP authentication credentials on client devices. Summit Data Communications is the mobile in today s mobile computers, medical devices, and other business-critical mobile devices. Summit Wi-Fi radios are optimized for the challenging radio environments in which such devices operate, such as hospitals, factories, warehouses, ports, and retail stores. Copyright 2010 Summit Data Communications, Inc. Summit Data Communications, the Summit logo, and Connected. No Matter What. are trademarks of Summit Data Communications, Inc. All rights reserved. Wi-Fi, Wi-Fi Alliance, Wi-Fi Protected Access, WPA, and WPA2 are registered trademarks, and Wi-Fi CERTIFIED is a trademark of the Wi-Fi Alliance. 10 WiFi_Client_Security_and_HIPAA_wp_201210
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Wi-Fi Client Device Security and Compliance with PCI DSS
Wi-Fi Client Device Security and Compliance with PCI DSS A Summit Data Communications White Paper Original Version: June 2008 Update: January 2009 Protecting Payment Card Information It is every retailer
Wi-Fi in Healthcare:
Wi-Fi in Healthcare: Security Solutions for Hospital Wi-Fi Networks Wi-Fi Alliance February 2012 The following document and the information contained herein regarding Wi-Fi Alliance programs and expected
The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs
The Value of Cisco Compatible Extensions (CCX) for Philips PageWriter Cardiographs A White Paper from Philips Healthcare and Summit Data Communications February 2009 Philips Healthcare and Summit Data
A White Paper from Laird Technologies
Cisco Compatible Extensions and Medical Devices Originally published: July 2012 Updated: October 2012 A White Paper from Laird Technologies While CCX has been an overwhelming success in the laptop world,
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003
Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003 2003 Wi-Fi Alliance. Wi-Fi is a registered trademark of the Wi-Fi Alliance
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics
HIPAA Security S E R I E S Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual
ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.
For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today! www.lutrum.com 844-644-4600 This publication describes the implications of HIPAA (the Health
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise
Michael Disabato Service Director Network & Telecom Strategies [email protected] Diana Kelley Senior Analyst Security & Risk Management Strategies [email protected] www.burtongroup.com WiFi
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
WLAN Authentication and Data Privacy
WLAN Authentication and Data Privacy Digi Wi-Point 3G supports various Wi-Fi security options, including WEP-40/WEP-104 and WPA- PSK and WPA2-PSK. To configure WLAN security on DIGI WI-POINT 3G, you may
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with RangeBooster User Guide Model No. WMP54GR Copyright and Trademarks Specifications are subject to change without notice.
Advanced Security Issues in Wireless Networks
Advanced Security Issues in Wireless Networks Seminar aus Netzwerke und Sicherheit Security Considerations in Interconnected Networks Alexander Krenhuber Andreas Niederschick 9. Januar 2009 Advanced Security
Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:
IMPORTANT! This Guide refers to the following Products: Securing Your Wireless Network Please read the following carefully; Synopsis: This Guide is designed to help you if you have a Wireless Network that
Network Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved.
HIPAA Compliance and Wireless Networks White Paper HIPAA Compliance and Wireless Networks 2005 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones
Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones Polycom s SpectraLink 8400 Series wireless phones meet the highest security requirements. By the time you deploy
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication
WLAN Security WEP Overview 1/2 WEP, Wired Equivalent Privacy Introduced in 1999 to provide confidentiality, authentication and integrity Includes weak authentication Shared key Open key (the client will
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability Implementing WLAN QoS Objectives Describe why WLANs need to support QoS policies in enterprise networks. Explain the issues
How Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
HIPAA Compliance and Wireless Networks
HIPAA Compliance and Wireless Networks White Paper 2004 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property of Cranite Systems, Inc. and/or
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Huawei WLAN Authentication and Encryption
Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions
CISCO WIRELESS SECURITY SUITE
Q&A CISCO WIRELESS SECURITY SUITE OVERVIEW What is the Cisco Wireless Security Suite? The Cisco Wireless Security Suite is an enterprise-ready, standards-based, wireless LAN (WLAN) security solution for
Information Supplement: PCI DSS Wireless Guidelines
Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: August, 2011 Author: Wireless Special Interest Group (SIG) PCI Security Standards Council Information Supplement: PCI DSS Wireless Guidelines
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION
WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION Ingenico is often asked: what are the differences between Bluetooth and Wi-Fi technologies, which is the best one,
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
How To Secure A Wireless Network With A Wireless Device (Mb8000)
MB8000 Network Security and Access Control Overview MB8000 employs almost all of the current popular WLAN security mechanisms. These include wireless-user isolation, closed system (by turning off SSID
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Wireless Pre-Shared Key Cracking (WPA, WPA2)
Wireless Pre-Shared Key Cracking (WPA, WPA2) TABLE OF CONTENTS Introduction... 2 Mechanics Of PSKs And How They Work Demystified... 2 How PSKs Can Be Cracked!... 5 WPA2 PSK Cracking Demonstration.... 6
Question How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and
Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Information Supplement: PCI DSS Wireless Guideline
Standard: Data Security Standard (DSS) Version: 1.2 Date: July 2009 Author: Wireless Special Interest Group Information Supplement: PCI DSS Wireless Guideline Prepared by the PCI SSC Wireless Special Interest
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter User Guide Model No. WMP54G Copyright and Trademarks Specifications are subject to change without notice. Linksys is a
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Develop HIPAA-Compliant Mobile Apps with Verivo Akula
Develop HIPAA-Compliant Mobile Apps with Verivo Akula Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200 [email protected] Verivo Software 1000 Winter Street Waltham MA 02451 781.795.8200
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Information Supplement: PCI DSS Wireless Guidelines
Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: August, 2011 Author: Wireless Special Interest Group (SIG) PCI Security Standards Council Information Supplement: PCI DSS Wireless Guidelines
HIPAA. considerations with LogMeIn
HIPAA considerations with LogMeIn Introduction The Health Insurance Portability and Accountability Act (HIPAA), passed by Congress in 1996, requires all organizations that maintain or transmit electronic
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS
A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS Jose Perez Texas A&M University Corpus Christi Email: [email protected] Fax Number: (361) 825-2795 Faculty Advisor: Dr. Ahmed Mahdy, Texas A&M University
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2)
EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE 802.11i (WPA2) Moffat Mathews, Ray Hunt Department of Computer Science and Software Engineering, University of Canterbury, New Zealand {[email protected]}
Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS
Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012. Part 7 Wireless Network Security
UNIK4250 Security in Distributed Systems University of Oslo Spring 2012 Part 7 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s charter to develop
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks
CSC574: Computer and Network Security
CSC574: Computer and Network Security Lecture 21 Prof. William Enck Spring 2016 (Derived from slides by Micah Sherr) Wireless Security Wireless makes network security much more difficult Wired: If Alice
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview
IBM Internet Security Systems The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview Health Insurance Portability and Accountability Act
Securing Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises
Expert Reference Series of White Papers WPA2 Security: Choosing the Right WLAN Authentication Method for Homes and Enterprises 1-800-COURSES www.globalknowledge.com WPA2 Security: Choosing the Right WLAN
itrust Medical Records System: Requirements for Technical Safeguards
itrust Medical Records System: Requirements for Technical Safeguards Physicians and healthcare practitioners use Electronic Health Records (EHR) systems to obtain, manage, and share patient information.
Cipher Suites and WEP
Cipher Suites and WEP This module describes how to configure the cipher suites required for using Wireless Protected Access (WPA) and Cisco Centralized Key Management (CCKM); Wired Equivalent Privacy (WEP);
