WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network
|
|
|
- Hector Jefferson
- 10 years ago
- Views:
Transcription
1 WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA
2 Executive Summary Wireless Local Area Networks based on the IEEE standard (also called `Wi-Fi, and referred to as `WLAN in this white paper) have proliferated in enterprises, homes, and public places. IEEE a, b, and g are now considered as a de facto standard for WLANs. Embedding of wireless technology into laptops, personal digital assistants (PDAs), and phones has significantly increased the user base of WLAN devices. It is anticipated that majority of the laptops and notebook computers will have embedded WLAN capability. In addition, the mobile user base is anticipated to grow manifold in the coming years with many of them being WLAN users. While WLANs are known for convenience, flexibility, productivity, and low cost, enterprise networks are vulnerable due to security threats posed by the presence of these devices, irrespective of whether the enterprise has an officially deployed WLAN or not. Conventional firewalls, VPNs, and security mechanisms in the standard are unable to alleviate these threats. This white paper describes these new security threats from WLANs and desirable features of a new type of security system a Wi-Fi Firewall to prevent them. A New Class of Security Threats to Enterprise Networks The prevailing model of enterprise network security is rooted in the axiom that being "physically inside is safe and outside is unsafe. Connecting to a network point within the enterprise premises is generally considered safe and is subject to weaker security controls. On the other hand, tight security controls are enforced at the network traffic entry and exit points using firewalls and Virtual Private Networks (VPNs). A WLAN breaks the barrier provided by the building perimeter as the physical security envelope for a wired network. This is because invisible radio signals used by the WLAN cannot be confined within the physical perimeter of a building, and usually cut through walls and windows. This creates a backdoor for unauthorized devices to connect to the enterprise network. Some specific security threats from WLANs are described below. Rogue APs: WLAN Access Points (APs) are inexpensive, easy to install, and small enough to be carried by a person. Unauthorized WLAN APs can be connected to an enterprise network unwittingly or with malicious intention without the knowledge of the IT administration. All it takes is to carry the device inside the enterprise premises, and connect it to an Ethernet port on the network. Since Rogue APs are typically deployed by employees looking for quick wireless access, they are usually installed without any WLAN security controls (such as Access Control Lists, Wired Equivalent Protocol, 802.1x, i etc). As they can be connected to virtually any Ethernet port on the network, they can bypass existing WLAN security control points such as Wi-Fi switches and firewalls. The radio coverage of Rogue APs cannot be confined within the building perimeter of the enterprise. Unauthorized users can now connect to the enterprise net- Page 1 of 3
3 work through these Rogue APs using their radio spillage. The invisibility of wireless medium makes it difficult to prevent this undesirable activity. Mis-configured APs: APs support a variety of security features and configuration settings. In many cases, the IT administration may have left the authorized APs to their factory default setting or may not set the configuration properly. This may New Security Threats from WLAN result in no encryption or a weak form of encryption such as WEP on the wireless link. It is also possible that the AP does not perform any authentication on the client devices seeking to connect to it, and hence the enterprise network, over the wireless link. Mis-configured APs can pose a variety of security threats. For example, intruders can eavesdrop on the wireless communication between a mis-configured authorized AP and an authorized client in the enterprise WLAN. The intruder can read this communication if encryption is weak. If the mis-configured AP does not perform proper authentication of clients, the unauthorized user will be able to connect to the enterprise network through this AP. A recent hacking fad, called `war-driving, involves using freely available tools on the Internet to discover and publicize APs whose signals spill in public places. Various reconnaissance tools such as Netstumbler, Wellenreiter, and others are freely available on the Internet. Soft APs: With client cards and embedded WLAN radios in PDAs and laptops, a threat called soft AP is on the rise. A soft AP functions as an AP under software control and can be lunched inadvertently or through a virus program; unauthorized users can now connect to the enterprise network through soft APs using their radio spillage. MAC Spoofing: APs in a WLAN transmit beacons (or probe responses) to advertise their presence in the air. The beacons of an AP contain information about its MAC address, which is its identity, and SSID, which is the identity of the network it supports. Wireless clients listen to beacons from different APs in the vicinity. Clients typically connect to an AP that advertises Page 2 of 7
4 the desired SSID and transmits a strong beacon signal. A number of WLAN AP models available in the market allow their MAC addresses and SSIDs to be user defined. APs as well as many software tools are also available that enable setting of MAC addresses and SSIDs of AP devices to virtually any user defined values. In MAC Spoofing, the attacker programs the AP to advertise exactly the same identity information as that of the victim AP. A MAC spoofing AP can also launch disruptive attacks such as packet dropping and packet corruption and modification. A MAC Spoofing AP can even connect to the wired enterprise network as a Rogue AP and evade detection by conventional site survey tools. A MAC Spoofing AP can lure authorized wireless clients in the enterprise WLAN into establishing a connection and providing confidential information to it. It can insert itself as a man-inthe-middle (described in more detail in the next paragraph) of an authorized communication. Honeypot APs: Multiple wireless networks can coexist in the same space enabling users to connect to any available network, whether it is one s own network or some other network in the vicinity with overlapping radio coverage. This feature can be exploited by intruders who can set up an unauthorized wireless network with overlapping radio coverage with the enterprise wireless network. It requires powering on an AP in the vicinity (e.g. street or parking lot) of the enterprise wireless network. These APs can attract authorized enterprise clients into connecting to them by transmitting a stronger beacon signal and MAC spoofing. Such APs are called Honeypot APs or Evil Twins. An authorized user unwittingly connecting to a Honeypot AP creates security vulnerability by inadvertently providing sensitive information such as its identity to the Honeypot AP. The intruder can also act as a man-in-the-middle of a communication of an authorized client using Honeypot APs. Authorized wireless clients in the enterprise WLAN can also accidentally connect to non-malicious neighboring APs (called `client mis-associations ). Nonetheless, this creates security vulnerability as the wireless clients may inadvertently provide confidential information to such APs. This can happen due to mis-configuration on clients and/or on neighboring APs. Denial of Service: WLANs are being increasingly entrusted with carrying mission-critical applications such as database access, VoIP, and Internet access. These applications can be disrupted with a DOS attack causing network downtime, user frustration, and loss of productivity. As WLAN transmissions are a shared medium, they are easily susceptible to DOS attacks. Additionally, soft spots in the MAC protocol can be easily exploited to launch DOS attacks. To name a few, DOS attacks such as authentication, association, de-authentication or disassociation flood, NAV attack, CTS flood, and EAP and EAPOL message floods are easy to launch and have the potential of bringing down the entire enterprise WLAN. Unfortunately, a variety of DOS tools are freely available on the Internet including AirJack, FataJack, Void11 and Fake AP Page 3 of 7
5 Ad Hoc Networks: The WLAN standard has provisions for establishing peer-to-peer wireless connections between wireless clients. The wireless clients can therefore form an ad hoc network among themselves using this provision. However, the ad hoc networks can create security vulnerability. For example, an intruder on the street, parking lot, or neighboring premises can form a peer-to-peer ad hoc wireless connection with an authorized laptop in the enterprise premises. The intruder can then launch security attacks on the laptop using this wireless connection. For example, if the laptop has a setting to share certain resources (files, directories, etc.) with other authorized laptops in the enterprise, the intruder can also get access to these resources over the ad hoc wireless connection. The seriousness of threats to enterprise network security from Rogue APs, Mis-configured APs, Soft APs and ad hoc networks cannot be underestimated. Unauthorized devices connecting to the enterprise network through such APs can engage in data theft, data rerouting, data corruption, impersonation, denial of service, virus injection, and many other types of attacks on the computer systems in the (wired) enterprise network. This vulnerability exists in organizations that have official WLAN deployments, as well as those which have banned wireless on their premises. Protecting Enterprise Networks from WLAN Threats The emergence of WLANs has created a new breed of security threats to enterprise networks, which cannot be mitigated by traditional firewall technologies and VPNs. The firewall is similar to a lock on the front door to block unauthorized wired traffic from reaching the internal trusted enterprise network. A VPN protects enterprise data traveling beyond the boundaries of the enterprise network into the public Internet. However, these technologies as well as the encryption and authentication mechanisms such as WEP, WPA, 802.1x, and i cannot plug the security holes created by Rogue APs, Mis-configured APs, and Soft APs. Conventional enterprise network security systems are not designed to detect and prevent threats from MAC spoofing, Honeypots, DOS, and ad hoc wireless networks. A new security solution called Wi-Fi Firewall is therefore needed that: Monitors the wireless activity within and in the vicinity of the enterprise premises. Classifies WLAN transmissions into harmful and harmless. Prevents transmissions that pose a security threat to the enterprise network. Locates participating devices for physical remediation. The Wi-Fi Firewall comprises of wireless sensor devices for wireless monitoring that are placed Page 4 of 7
6 spatially to cover the enterprise premises. These sensors keep a constant vigil on the enterprise air and create an RF shield to alleviate security threats from WLANs. The five key features of the Wi-Fi Firewall are planning, detecting, classifying, protecting, and locating. These features are described below. 1. Planning WLAN RF Coverage: The spatial layout as well as materials Wi-Fi Firewall Protection within the enterprise (walls, columns, windows, furniture, etc.) interacts with the radio coverage of the sensor in a complex way creating a gap between rule-of-thumb for placing APs and reality. A systematic, scientific, and scalable RF planning process is therefore required for determining the right placement of access points and wireless sensors. This process must account for the spatial layout of the premises and indoor RF signal propagation characteristics. This ensures that there are no holes in the Wi-Fi Firewall coverage through which undesirable wireless activity can go unabated. 2. Detecting WLAN Transmissions: The Wi-Fi Firewall needs to scan radio channels and capture any wireless activity detected on these channels using spatially distributed sensors. It is necessary to scan all the channels in the 2.4 GHz (b, b/g) and 5 GHz (a) band. It needs to analyze, aggregate, and correlate information reported by different sensors. 3. Classifying WLAN Transmissions: With increasing penetration of WLANs, there is a need to accurately and automatically sort harmful activity from the harmless activity in the shared wireless medium. For example, in organizations with no official WLAN deployment, either any wireless activity detected in the air is due to a Rogue AP or it could be emanating from an external (neighbor s) WLAN. The Wi-Fi Firewall must categorize it accordingly. In organizations with official WLAN infrastructure, the Wi-Fi Firewall must be able to differentiate between authorized, rogue, and external wireless activities. This type of classification minimizes annoying false alarms and volumes of irrelevant alerts from the security standpoint, both of which make the security system unusable. The automat- Page 5 of 7
7 ic classification also facilitates automatic intrusion prevention as described in the following paragraph. Classification of WLAN Transmission 4. Protecting Against Intrusion: The Wi-Fi Firewall must automatically and instantaneously block harmful wireless activity detected by its wireless sensors until remediation. For example, the Wi-Fi Firewall must block any client from connecting to a Rogue AP or a MAC spoofing AP, prohibit formation of ad-hoc networks, and mitigate any type of DOS attack. Further, it must block harmful wireless activity until physical remediation has taken place. Prevention of harmful WLAN transmission must be carried out with surgical precision without disturbing legitimate WLAN activities. It should not bring down the entire wireless network like some brute force methods such as radio jamming would do. The prevention should also be reliable to minimize false alarms and block every single unauthorized activity. 5. Locating WLAN Devices: Physical remediation i.e. disconnecting and powering off the WLAN device(s) taking part in harmful activity requires knowledge of the physical location of these devices. The Wi-Fi Firewall must provide the location co-ordinates of such a device inside and around the perimeter of the enterprise premises. There should be no need for any specialized client side software or hardware. SpectraGuard: Industry s First Wi-Fi Firewall SpectraGuard from AirTight Networks is the industry s first comprehensive Wi-Fi Firewall that effectively tackles security threats from WLANs. SpectraGuard provides RF planning, detection, accurate classification automatic prevention, and location tracking. It comprises an overlay network of RF sensors, called SpectraSensors that are dedicated to the monitoring of wireless activity in the enterprise air. The SpectraSensors communicate with a centralized high availability SpectraGuard Server. This client-server architecture is well suited for medium to large enterprise installations. The system architecture of SpectraGuard is illustrated below. Page 6 of 7
8 SpectraGuard System Architecture Summary 1. WLANs are being rapidly adopted due to the convenience and flexibility they provide. However, WLANs create a new set of security threats to enterprise networks such as Rogue APs, Mis-configured APs, Soft APs, MAC Spoofing, Honeypot APs, DOS, and Ad hoc Networks. 2. Neither traditional firewalls and VPNs nor IEEE security standards such as WEP, WPA, 802.1x, and i can protect enterprise networks against over-the-air attacks from WLANs. 3. A new and comprehensive security solution in the form of a Wi-Fi Firewall is required to alleviate these new security threats. The Wi-Fi Firewall must be able to provide RF planning, detection of RF activity, accurate classification of WLAN networks, automatic and reliable prevention from harmful WLAN transmissions, and precision location tracking of WLAN devices. 4. The SpectraGuard solution from AirTight Networks is industry s first comprehensive Wi-Fi Firewall that can effectively protect enterprise networks against over-the-air attacks from WLANs. Page 7 of 7
Wireless Security and Healthcare Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance
Going Beyond IEEE 802.11i to Truly Ensure HIPAA Compliance 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs are prevalent in healthcare institutions. The
Ensuring HIPAA Compliance in Healthcare
The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Wireless (In)Security Trends in the Enterprise
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc. All rights reserved. WiFi is proliferating fast.
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
Understanding WiFi Security Vulnerabilities and Solutions. Dr. Hemant Chaskar Director of Technology AirTight Networks
Understanding WiFi Security Vulnerabilities and Solutions Dr. Hemant Chaskar Director of Technology AirTight Networks WiFi Proliferation Global WiFi Radio Chipset Sales 387 307 Millions 120 200 2005 2006
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Industrial Communication. Securing Industrial Wireless
Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
How To Protect A Wireless Lan From A Rogue Access Point
: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other
Wireless Vulnerability Assessment For: ABC
AIRTIGHT NETWORKS REPORTS Wireless Vulnerability Assessment For: ABC From: Apr 17, 2008 12:55 PM To: Apr 17, 2008 4:55 PM Location: \\ABC Corp A Report by AirTight Networks, Inc. 339 N. Bernardo Avenue,
Best Practices for Securing Your Enterprise Wireless Network
339 N. Bernardo Avenue Mountain View, CA 94043 www.airtightnetworks.net Overview With the rapid adoption of Wi-Fi networks by enterprise IT departments everywhere, network security now involves an entirely
WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance
WHITEPAPER Wireless LAN Security for Healthcare and HIPAA Compliance Wireless LAN Security for Healthcare and HIPAA Compliance Wireless deployments in healthcare institutions have accelerated as mobility
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks
WHITE PAPER The Need for Wireless Intrusion Prevention in Retail Networks The Need for Wireless Intrusion Prevention in Retail Networks Firewalls and VPNs are well-established perimeter security solutions.
Cisco Adaptive Wireless Intrusion Prevention System
Data Sheet Cisco Adaptive Wireless Intrusion Prevention System Product Overview The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium, the wireless spectrum
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Cisco Adaptive Wireless Intrusion Prevention System
Cisco Adaptive Wireless Intrusion Prevention System Product Overview The wireless spectrum is a new frontier for many IT organizations. Like any other networking medium, the wireless spectrum must be properly
Windows 7 Virtual Wi-Fi: The Easiest Way to Install a Rogue AP on Your Corporate Network
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2010 AirTight Networks, Inc. All rights reserved. Introduction Last few years
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Wireless Intrusion Detection Systems (WIDS)
Systems (WIDS) Dragan Pleskonjic CONWEX [email protected] [email protected] Motivation & idea Wireless networks are forecasted to expand rapidly (Wi-Fi IEEE 802.11a/b/g ) WLANs offer
Wireless Security Strategies for 802.11ac and the Internet of Things
339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2014 AirTight Networks, Inc. All rights reserved. The Internet of Things is a double-edged sword. While it confers many
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
Protect the Air: Testing Aruba Networks RFProtect AirWave Capabilities to Detect and Repel WLAN Attacks
Protect the Air: Testing Aruba Networks RFProtect AirWave Capabilities to Detect and Repel WLAN Attacks January 2011 Page2 Table of Contents 1 Executive Summary... 3 2 Introducing RFProtect and AirWave...
Link Layer and Network Layer Security for Wireless Networks
Link Layer and Network Layer Security for Wireless Networks Interlink Networks, Inc. May 15, 2003 1 LINK LAYER AND NETWORK LAYER SECURITY FOR WIRELESS NETWORKS... 3 Abstract... 3 1. INTRODUCTION... 3 2.
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Wireless Network Rogue Access Point Detection & Blocking
Summary Rogue devices can potentially disrupt enterprise wireless networks and can sometimes cause irrevocable damage to the company. Enterprises could unknowingly open up their Intellectual Property (IP)
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Security Requirements for Wireless Local Area Networks
Information Technology Security Guidance Security Requirements for Wireless Local Area Networks Overview ITSG-41 March 2013 Foreword The ITSG-41 Security Requirements for Wireless Local Area Networks document
Link Layer and Network Layer Security for Wireless Networks
White Paper Link Layer and Network Layer Security for Wireless Networks Abstract Wireless networking presents a significant security challenge. There is an ongoing debate about where to address this challenge:
PCI DSS 3.1 and the Impact on Wi-Fi Security
PCI DSS 3.1 and the Impact on Wi-Fi Security 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2015 AirTight Networks, Inc. All rights reserved. Table of Contents PCI
Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System
Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
WIRELESS NETWORKING SECURITY
WIRELESS NETWORKING SECURITY Dec 2010 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Don t Let Wireless Detour Your PCI Compliance
Understanding the PCI DSS Wireless Requirements A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2012 AirTight Networks, Inc.
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK
DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK ABSTRACT Dr. Sanjeev Dhull Associate Professor, RPIIT Karnal, Dept of Computer Science The DoS attack is the most
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter
Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter Introduction Who are we? Matt Moore, Senior Consultant @ PenTest Ltd. Mark Rowe, Technical Director @ PenTest Ltd. What
1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:
Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland [email protected]
DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland [email protected] 1 Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring
INFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE IAD Best Practices for Securing Wireless Devices and Networks in National Security Systems IAG U/OO/814639-15 13 October
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science
Security Measures taken in Securing Data Transmission on Wireless LAN 1 AGWU C. O., 2 ACHI I. I., AND 3 OKECHUKWU O. 1 Department of Computer Science Ebonyi State University Abakaliki 2 Department of Computer
WIRELESS SECURITY TOOLS
WIRELESS SECURITY TOOLS Johanna Janse van Rensburg, Barry Irwin Rhodes University [email protected], [email protected] (083) 944 3924 Computer Science Department, Hamilton Building, Rhodes University
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Virtual Access Points
Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Dedicated Air Monitors? You Decide.
Tech Brief Enterprise Dedicated Air Monitors? You Decide. Introduction Aruba customers commonly ask: Do I need dedicated air monitors in an Aruba deployment, or can I get by with just access points? The
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK
ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK The Rogue Access Point Problem One of the most challenging security concerns for IT managers today is the
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Network Security: Introduction
Network Security: Introduction 1. Network security models 2. Vulnerabilities, threats and attacks 3. Basic types of attacks 4. Managing network security 1. Network security models Security Security has
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
Chapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
AirTight C-55 Access Point
AirTight C-55 Access Point Dual radio, dual concurrent 2x2:2 Wi-Fi access or 24/7 wireless intrusion prevention. Designed for High Performance The AirTight C-55 is an enterprise grade dual radio, dual
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
m-trilogix White Paper on Security in Wireless Networks
m-trilogix White Paper on Security in Wireless Networks Executive Summary Wireless local area networks (WLANs) based on IEEE 802.11b (Wi-Fi) will ship, according to a Cahners- Instat study, 23.6 million
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
Wireless Security with Cyberoam
White paper Cyberoam UTM Wireless Security with Cyberoam Robust, Fault-tolerant security is a must for companies sporting wireless networks. Cyberoam UTM strengthens the existing Wireless Security Architecture
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment
Integrating Wired IDS with Wi-Fi Using Open-Source IDS to Complement a Wireless IDS/IPS Deployment Table of Contents Introduction 3 Limitations in WIDS monitoring 3 Monitoring weaknesses 3 Traffic analysis
