Date post: | 03-Apr-2018 |
Category: |
Documents |
Upload: | parv-sharma |
View: | 216 times |
Download: | 0 times |
of 28
7/28/2019 Parv Sharma- Wireless Security
1/28
A presentation on
WIRELESS SECURITYPRESENTATION BY:
PARV SHARMA3307409CSE 4th Yr
7/28/2019 Parv Sharma- Wireless Security
2/28
WIRELESS
7/28/2019 Parv Sharma- Wireless Security
3/28
Wireless is the transfer of informationover a distance without the use of electricalconductors or wires. The distances involvedmay be short (a few meters as in televisionremote control) or long (thousands or
millionsof kilometers for radiocommunications).
7/28/2019 Parv Sharma- Wireless Security
4/28
HISTORY OF WIRELESS
The first wireless transmitters went on the air in theearly century using radiotelegraphy Later, as
modulation,made it possible to transmit voices andmusic via wireless, the medium came to be called"radio." With the advent of television, fax, datacommunication, and the effective use of a largerportion of the spectrum, the term "wireless" has
been resurrected.
7/28/2019 Parv Sharma- Wireless Security
5/28
WHY WIRELESS ESSENTIAL
Delivers real time information.
Helps in quick and accurate decision making.
Continuous supply of information whenever needed.
Increases productivity.
Reduces costs via more accurate and timely datacapture.
Incorporate professionalism in the working in the
organization.
7/28/2019 Parv Sharma- Wireless Security
6/28
EXAMPLES OF WIRELESS EQUIPEMENTCellular phones and pagers
Global Positioning System (GPS)
Cordless computer peripherals
Cordless telephone setsHome-entertainment-system control boxes
Remote garage-door openers
Two-way radiosBaby monitors
Satellite Television
Wireless LAN or local area networks
7/28/2019 Parv Sharma- Wireless Security
7/28
TYPES OF WIRELESS NETWORK
Wireless local area networks
Personal area networks
Wide area networks/ Metropolitan AreaNetwork
Mobile Device Networks
7/28/2019 Parv Sharma- Wireless Security
8/28
WIRELESS BROAD BAND ACCESS
Wi-Fi
Wi-MAX
7/28/2019 Parv Sharma- Wireless Security
9/28
SECURITY REQUIREMENT IN WIRELESS
Authenticity : A third party must be able to verifythat the content of a message has not been changed
in transit.
Nonrepudiation : The origin or the receipt of aspecific message must be verifiable by a third party.
Accountability : The actions of an entity must be
traceable uniquely to that entity
7/28/2019 Parv Sharma- Wireless Security
10/28
SECURITY METHOD IN WIRELESS FIELD
WEP (Wired Equivalent Privacy)
SSID(Service Set Identifier)MAC(Media Access Control)
7/28/2019 Parv Sharma- Wireless Security
11/28
INTRODUCTION TO WIRELESS NETWORK
Wireless networks serve as the transport mechanismbetween devices and among devices and the
traditional wired networks (enterprise networks andthe Internet).
7/28/2019 Parv Sharma- Wireless Security
12/28
NETWORK TOPOLOGY STAR TOPOLOGY
RING TOPOLOGY
MESH TOPOLOGY
BUS TOPOLOGY
TREE TOPOLOGY
7/28/2019 Parv Sharma- Wireless Security
13/28
WIRELESS SECURITY
Is the prevention of unauthorized accessor damage to computers using wirelessnetworks. Wireless networks are verycommon, both for organizations andindividuals.
7/28/2019 Parv Sharma- Wireless Security
14/28
TYPES OF UNAUTHORIZED ACCESS
ACCIDENTIAL ASSOCIATION
MALICIOUS ASSOCIATION
ADHOC NETWORK NON-TRADITIONAL NETWORK
IDENTITY THEFT
MANIN-THE-MIDDLE ATTACKS
DENIAL OF SERVICE
NETWORK INJECTION
CAFFE LATTE ATTACK
7/28/2019 Parv Sharma- Wireless Security
15/28
ATTACK METHODS
HUMAN ERROR
ROGUE ACCESS POINT
WARCHALKING
MAC ADDRESS SPOFING
NOISY NEIGHBOURS IMPROPER DESIGN
7/28/2019 Parv Sharma- Wireless Security
16/28
BASIC DEFENCE IN WIRELESS SECURITY
WEP(WIRELESS ENCRYPTION PROTOCOL)
MAC ADDRESS BLOCKING
DITCH THE DEFAULT BEACON INTERVALS
CONTROLLING RESET
DISABLE DHCP
7/28/2019 Parv Sharma- Wireless Security
17/28
INTRODUCTION TO 802.11 SECURITY
The IEEE 802.11 specification identified several servicesto provide a secure operating environment. The securityservices are provided largely by the Wired Equivalent
Privacy (WEP) protocol to protect link-level data duringwireless transmission between clients and access points.WEP does not provide end-to-end security, but only forthe wireless portion of the connection.
7/28/2019 Parv Sharma- Wireless Security
18/28
SECURITY FEATURE OF 802.11 AS STANDARD
A.AUTHENTICATION
B.CONFIDIENTIALITY
C.INTEGRITY
7/28/2019 Parv Sharma- Wireless Security
19/28
UNDERSTAND 802.11 FAMILY1.802.11
2.802.11A
3.802.11B
4.802.11G
7/28/2019 Parv Sharma- Wireless Security
20/28
FUTURE OF WIRELESS
1.ULTRA WIDE BAND
2.COGNITIVE RADIO
3.MILLIMETER WAVE RADIO TECHNOLOGY
4.MULTIMODE
5.4G
7/28/2019 Parv Sharma- Wireless Security
21/28
SOME SNAPS OF WIRELESS REVOLUTION
7/28/2019 Parv Sharma- Wireless Security
22/28
7/28/2019 Parv Sharma- Wireless Security
23/28
7/28/2019 Parv Sharma- Wireless Security
24/28
7/28/2019 Parv Sharma- Wireless Security
25/28
7/28/2019 Parv Sharma- Wireless Security
26/28
7/28/2019 Parv Sharma- Wireless Security
27/28
QUESTIONS
7/28/2019 Parv Sharma- Wireless Security
28/28
QUESTIONS