29
Security Awareness Wireless Network Security

Wireless Network Security - Electronics – Online Distance

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Wireless Network Security - Electronics – Online Distance

Security Awareness

Wireless Network Security

Page 2: Wireless Network Security - Electronics – Online Distance

Attacks on Wireless Networks

• Three-step process

– Discovering the wireless network

– Connecting to the network

– Launching assaults

Security Awareness, 3rd Edition 2

Page 3: Wireless Network Security - Electronics – Online Distance

Discovering

• Beaconing

– At regular intervals, a wireless router sends a signal

to announce its presence

• Scanning

– Wireless device looks for the incoming beacon

information

• Wireless location mapping

– Also known as war driving

– Finding a beacon from a wireless network and

recording information about it

Security Awareness, 3rd Edition 3

Page 4: Wireless Network Security - Electronics – Online Distance

Discovering (cont’d.)

• Tools needed for war driving

– Mobile computing device

– Wireless NIC adapter

– Antenna

• Omnidirectional antenna

– Global positioning system (GPS) receiver

– Software

Security Awareness, 3rd Edition 4

Page 5: Wireless Network Security - Electronics – Online Distance

Discovering (cont’d.)

Figure 5-8 USB wireless NIC

Security Awareness, 3rd Edition 5

Course Technology/Cengage Learning

Page 6: Wireless Network Security - Electronics – Online Distance

Connecting

• Service Set Identifier (SSID)

– ‘‘Network name’’ and can be any alphanumeric

string from 2 to 32 characters

• Wireless networks are designed to freely distribute

their SSID

• Once a wireless device receives a beacon with the

SSID, it can then attempt to join the network

– Virtually nothing that an attacker must do in order to

connect

Security Awareness, 3rd Edition 6

3rd

Page 7: Wireless Network Security - Electronics – Online Distance

Connecting (cont’d.)

Figure 5-9 Connecting to a wireless network

Security Awareness, 3rd Edition 7

Course Technology/Cengage Learning

Page 8: Wireless Network Security - Electronics – Online Distance

Connecting (cont’d.)

• Some wireless security sources encourage users

to configure APs to prevent the beacon from

including the SSID

– Does not provide protection

Security Awareness, 3rd Edition 8

Page 9: Wireless Network Security - Electronics – Online Distance

Launching Assaults

• Eavesdropping

– Attackers can easily view the contents of

transmissions from hundreds of feet away

– Even if they have not connected to the wireless

network

Security Awareness, 3rd Edition 9

Page 10: Wireless Network Security - Electronics – Online Distance

Launching Assaults (cont’d.)

• Wired Equivalent Privacy (WEP)

– Ensure that only authorized parties can view

transmitted wireless information

– Encrypts information into ciphertext

– Contains a serious flaw

– Attacker can discover a WEP key in less than one

minute

Security Awareness, 3rd Edition 10

Page 11: Wireless Network Security - Electronics – Online Distance

Launching Assaults (cont’d.)

• Stealing data

– Once connected attacker treated as “trusted user”

– Has access to any shared data

• Injecting malware

– “Trusted user” enters from behind the network’s

firewall

– Can easily inject malware

• Storing illegal content

– Can set up storage on user’s computer and store

content

Security Awareness, 3rd Edition 11

Page 12: Wireless Network Security - Electronics – Online Distance

Launching Assaults (cont’d.)

• Launching denial of service (DoS) attacks

– Denial of service (DoS) attack

• Designed to prevent a device from performing its

intended function

– Wireless DoS attacks

• Designed to deny wireless devices access to the

wireless router itself

– Packet generator

• Create fake packets; flood wireless network with traffic

– Disassociation frames

• Communication from a wireless device that indicates

the device wishes to end the wireless connection

Security Awareness, 3rd Edition 12

Page 13: Wireless Network Security - Electronics – Online Distance

Launching Assaults (cont’d.)

Figure 5-13 DoS attack using disassociation frames

Security Awareness, 3rd Edition 13

Course Technology/Cengage Learning

Page 14: Wireless Network Security - Electronics – Online Distance

Launching Assaults (cont’d.)

• Impersonating a legitimate network

– Attackers will often impersonate legitimate networks

in restaurants, coffee shops, airports, etc.

– Does not require wireless router

– Ad hoc or peer-to-peer network

– Once the connection is made

• Attacker might be able to directly inject malware into

the user’s computer or steal data

Security Awareness, 3rd Edition 14

Page 15: Wireless Network Security - Electronics – Online Distance

Wireless Network Defenses

• Secure the home wireless network

• Use an unprotected public wireless network in the

most secure manner possible

Security Awareness, 3rd Edition 15

Page 16: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

• Locking down the wireless router

– Create username and password

– Do not use default password

– Typical settings on the wireless router login security

screen

• Router Password

• Access Server

• Wireless Access Web

• Remote Management

Security Awareness, 3rd Edition 16

Page 17: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

Figure 5-15 Wireless router login security screen

Security Awareness, 3rd Edition 17

Course Technology/Cengage Learning

Page 18: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

• Limiting users

– Restrict who can access network by MAC address

• MAC address filter

– Dynamic Host Configuration Protocol (DHCP)

• Wireless routers distribute IP addresses to network

devices

• Properly configuring settings

• DHCP lease

Security Awareness, 3rd Edition 18

3rd

Page 19: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

Figure 5-16 MAC address filter

Security Awareness, 3rd Edition 19

Course Technology/Cengage Learning

Page 20: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

• Turning on Wi-Fi protected access 2 (WPA2)

– Personal security model

– Designed for single users or small office settings

– Parts

• Wi-Fi Protected Access (WPA)

• Wi-Fi Protected Access 2 (WPA2)

– To turn on WPA2

• Choose security mode

• Select WPA Algorithm

• Enter shared key

Security Awareness, 3rd Edition 20

Page 21: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

Figure 5-18 Security Mode options

Security Awareness, 3rd Edition 21

Course Technology/Cengage Learning

Page 22: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

Figure 5-19 WPA Algorithms setting

Security Awareness, 3rd Edition 22

Course Technology/Cengage Learning

Page 23: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

• Configuring network settings

– Network Address Translation (NAT)

• Hides the IP addresses of network devices from

attackers

• Private addresses

• NAT removes the private IP address from the sender’s

packet and replaces it with an alias IP address

– Port address translation (PAT)

• Each packet is sent to a different port number

Security Awareness, 3rd Edition 23

Page 24: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

– Virtual local area networks (VLANs)

• Segment users or network equipment in logical

groupings

• Creates a separate virtual network for each user of the

wireless network

– Demilitarized Zone (DMZ)

• Separate network that sits outside the secure network

perimeter

• Limits outside access to the DMZ network only

Security Awareness, 3rd Edition 24

Page 25: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

Figure 5-21 Demilitarized zone (DMZ)

Security Awareness, 3rd Edition 25

Course Technology/Cengage Learning

Page 26: Wireless Network Security - Electronics – Online Distance

Securing a Home Wireless Network

(cont’d.)

– Port forwarding

• More secure than DMZ

• Opens only the ports that need to be available

Security Awareness, 3rd Edition 26

Page 27: Wireless Network Security - Electronics – Online Distance

Using a Public Wireless Network

Securely

• Turning on a personal firewall

– Runs as a program on the user’s local computer

– Operates according to a rule base

– Rule options

• Allow

• Block

• Prompt

– Stateless packet filtering

– Stateful packet filtering

• Provides more protection

Security Awareness, 3rd Edition 27

Page 28: Wireless Network Security - Electronics – Online Distance

Using a Public Wireless Network

Securely (cont’d.)

• Virtual Private Networks (VPNs)

– Uses an unsecured public network as if it were a

secure private network

– Encrypts all data that is transmitted between the

remote device and the network

– Advantages

• Full protection

• Transparency

• Authentication

• Industry standards

Security Awareness, 3rd Edition 28

Page 29: Wireless Network Security - Electronics – Online Distance

Figure 5-22 Virtual private network (VPN)

Security Awareness, 3rd Edition 29

Course Technology/Cengage Learning