15
© 2013 AirTight Networks, Inc. All rights reserved. Top 5 Wi-Fi Security Threats Dr. Pravin Bhagwat CTO, AirTight Networks

Top 5 wi fi security threats

  • Upload
    gruzabb

  • View
    592

  • Download
    1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved.

Top 5 Wi-Fi Security Threats

Dr. Pravin BhagwatCTO, AirTight Networks

Page 2: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 2

Wave of Wireless Consumerization

Uncontrolled increase in Wi-Fi devices

Most client Wi-Fi devices can operate in multiple modes

Do you know what’s happening on your network and premises?

Page 3: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 3

TJX Breach – The Tip of the Iceberg

Additional breaches

Page 4: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 4

Rogue APs

• APs attached to the enterprise LAN without permission

• Backdoor to the enterprise LAN

Page 5: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 5

Soft Rogue APs

Network interface bridging Internet connection sharing (ICS) Add-on devices (e.g., Windy31) Windows 7 Virtual Wi-Fi

Page 6: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 6

Client Misbehavior and Man-in-the-middle Attacks

• Ad-hoc connections• Connections to external APs• Probing for vulnerable SSIDs• Honeypot/Evil Twin target

Page 7: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 7

Bring Your Own Device (BYOD)

WPA2/802.1x alone cannot prevent unauthorized devices from accessing the enterprise network

Page 8: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 8

Recap of Common Intrusion and Extrusion Threats

Page 9: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 9

Wireless Security Strategies That Don’t Work!

We don’t have “that” problem because…A “No Wi-Fi” policy without enforcement

Page 10: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 10

MDM ≠ Network Security

What is the incentive to install MDM agents on personal devices?

Scope limited to “managed” devices that run MDM agent

No visibility into Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots

Page 11: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 11

NAC ≠ Wireless Security

Cannot block Rogue APs, Soft Rogues, Mobile Wi-Fi Hotspots

Scope limited to BYOD on “managed” WLAN

Suffers from “blind spots” – unauthorized Wi-Fi devices connecting via authorized devices

Page 12: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 12

Wireless Intrusion Prevention System (WIPS)

Automatic Device Classification

Comprehensive Threat Coverage

ReliableThreat Prevention

AccurateLocation Tracking

BYOD Policy Enforcement

Page 13: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 13

Wireless Security Enforcement using WIPS

With this in place, your network is protected from all types of wireless threats, vulnerabilities and attack tools!

External APs

Rogue APs (On Network)

Authorized APs

AP Classification

STOP

Client ClassificationPolicyMis-config

GO

STOP

IGNORE

DoS

External Clients

Authorized Clients

Rogue Clients

AUTOMATICALLY DETECT AND BLOCK RED PATHS!

Page 14: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 14

Identifying a True WIPS: WIDS vs. WIPS

True WIPS ApproachProtects against the fundamental wireless threat building blocks

Prevalent WIDS ApproachCat and mouse chase of exploits, tools and signatures

Page 15: Top 5 wi fi security threats

© 2013 AirTight Networks, Inc. All rights reserved. 15

Thank You!

Cloud Managed Secure Wi-Fi Solutions

[email protected]@AirTight+1 877 424 7844

US DoD Approved