+ All Categories
Home > Documents > TPS Reports Presents…

TPS Reports Presents…

Date post: 11-Feb-2016
Category:
Upload: perdy
View: 26 times
Download: 0 times
Share this document with a friend
Description:
TPS Reports Presents…. A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams. Image from: http://www.bullshitjob.com/officespace/milton.jpg. Agenda. Overview Wireless Standards Security Risks How to fix security risks How to install a wireless card - PowerPoint PPT Presentation
21
TPS Reports Presents… A Wireless Report Joy Gibbons Julia Grant Kelsie Kirkpatrick Kevin Moore Byron Williams Image from: http://www.bullshitjob.com/officespace/milton.jpg
Transcript
Page 1: TPS Reports Presents…

TPS Reports Presents…

A Wireless Report

Joy GibbonsJulia Grant

Kelsie KirkpatrickKevin Moore

Byron WilliamsImage from: http://www.bullshitjob.com/officespace/milton.jpg

Page 2: TPS Reports Presents…

Agenda Overview Wireless Standards Security Risks How to fix security risks How to install a wireless card Wrap-Up

Page 3: TPS Reports Presents…

Overview Wireless networks manipulate

electrical charges in order to communicate between devices.

Wireless Networks use a type of electric current known as Radio Frequency (RF).

Source: Wireless Security Primer 101

Page 4: TPS Reports Presents…

Wireless Standards What are wireless standards?

Agreements about how to communicate. Basically, this is what a network has to do to communicate to other networks.

The original IEEE802.11 standard is a specification for wireless local area networks (WLANs) developed by the Institute of Electrical and Electronics Engineers (IEEE).

There are several specifications in the family and new ones are occasionally added.

http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci341007,00.html

Page 5: TPS Reports Presents…

Wireless Standards About Wireless Standards:

Developed in 1989 Range of about 300 feet Many operate at 2.4 GHz range Transmit on Radio Frequencies

http://www.windowsecurity.com/articles/Wireless_Security_Primer_101.html

Page 6: TPS Reports Presents…

Wireless Standards Outline of the current wireless standards

Essentially, there is only one standard (802.11), it is constantly updated and revised by calling it names such as 802.11a, 802.11b, 802.11g, 802.11n, and so on.

The a, b, and g amendments are the most popular techniques for over the air modulation that uses the same protocol as 802.11.

The 802.11i amendment is when security was included, and the other amendments (c-f, h-j, n) are all service enhancements or revisions.

The 802.11n amendment is the newest standard, projected to be released in July 2007.

http://en.wikipedia.org/wiki/IEEE_802.11

Page 7: TPS Reports Presents…

Wireless Standards Regulations for Standards

Wireless standards are regulated under Part 15 of the FCC Rules and Regulations.

The frequency used by wireless standards 802.11b and 802.11g can be interrupted by microwave ovens and cordless telephones, for example. For this reason, 802.11a operates on a 5 GHz band in order to avoid this interference.

http://en.wikipedia.org/wiki/IEEE_802.11

Page 8: TPS Reports Presents…

Comparing Wireless StandardsStandard Data Rate Security Pros/Cons & More Info

IEEE 802.11

Up to 2Mbps in the 2.4GHz band

WEP & WPA This specification has been extended into 802.11b.

IEEE 802.11a

Up to 54Mbps in the 5GHz band

WEP & WPA

8 available channels. Less potential for RF interference than 802.11b and 802.11g. Better than 802.11b at supporting multimedia voice, video and large-image applications in densely populated user environments. (Wi-Fi)

IEEE 802.11b

Up to 11Mbps in the 2.4GHz band

WEP & WPA

Requires fewer access points than 802.11a for coverage of large areas. Offers high-speed access to data at up to 300 feet from base station. 14 channels available in the 2.4GHz band.(Wi-Fi)

IEEE 802.11g

Up to 54Mbps in the 2.4GHz band

WEP & WPA

May replace 802.11b. Improved security enhancements over 802.11. Compatible with 802.11b. 14 channels available in the 2.4GHz band.(Wi-Fi)

http://www.webopedia.com/quick_ref/WLANStandards.asp

Page 9: TPS Reports Presents…

Future of Wireless Standards802.11n:

“January 2004 IEEE announced that it had formed a new 802.11 Task Group (TGn) to develop a new amendment to the 802.11 standard for wireless local-area networks.

The real data throughput is estimated to reach a theoretical 540 Mbit/s (which may require an even higher raw data rate at the physical layer), and should be up to 100 times faster than 802.11b, and well over 10 times faster than 802.11a or 802.11g. It is projected that 802.11n will also offer a better operating distance than current networks.”

http://en.wikipedia.org/wiki/IEEE_802.11#802.11n

Release Date Op. Frequency Data Rate (Typ) Data Rate (Max) Range (Indoor)

2007 July?  ?  ? 540 Mbit/s  ?

Page 10: TPS Reports Presents…

Security Risks How does security in wireless

technology affect the Accounting world?

What are Security Risks for wireless technology?

How does a company combat security risks?

Page 11: TPS Reports Presents…

Security Risks Accidental Association Identity Theft or MAC Spoofing Ad-Hoc Networks Man-in-the-Middle

Image from: http://www.windowsecurity.com/articles/Wireless_Security_Primer_101.html

Page 12: TPS Reports Presents…

Security Methods to Counter Risks MAC ID filtering Static Dynamic Host Configuration Protocol (DHCP) Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Lightweight Extensible Authentication Protocol (LEAP) Protected Extensible Authentication Protocol (PEAP) Temporal Key Integrity Protocol (TKIP) Remote Authentication Dial In User Service (RADIUS) And many others…

Page 13: TPS Reports Presents…

DHCP and PEAP

Uses pre-assigned addresses for each MAC ID and is quite helpful by keeping non-authorized users away from AP’s.

PEAP gives a secure transfer of data, passwords, and encryption keys

Source: www.Wikipedia.com

Page 14: TPS Reports Presents…

WEP Was the original encryption standard

for wireless to be as safe as wired networks

“Secure” wireless network has never been achieved through a WEP because of flaws and the abilities of crackers to crack codes

TKIP helps avoid WEP problems with

Source: www.Wikipedia.com

Page 15: TPS Reports Presents…

WPA Uses a pre-shared key which

establishes security by using a 8 to 63 character passphrase, or a 64 character hexadecimal

Updated version is known as WPA2, which includes the final IEE802.11i standard that includes a different algorithm

Source: www.Wikipedia.com

Page 16: TPS Reports Presents…

RADIUS Authentication, authorization, and

accounting protocol used for remote network access

Most important function for accountants because is enforces user policies and restrictions and also records accounting information

Source: www.Wikipedia.com

Page 17: TPS Reports Presents…

Securing a Wireless Network Enable and configure WEP Secure service set identifier (SSID) by

changing the default SSID to a unique ID and changing it at frequent intervals.

Change passwords often

Source: Wireless Security Primer Part I

Page 18: TPS Reports Presents…

Securing a Wireless Network Change AP position. To do this run an

important site survey to locate problems and only cover areas that are in need of coverage.

Use MAC filtering to grant access to those with an acceptable MAC ID.

Use RADIUS to maintain user profiles in a central database that all devices can share and use.

Source: Wireless Security Primer Part I

Page 19: TPS Reports Presents…

Video for Wireless

Page 20: TPS Reports Presents…

Wrap-Up The main takeaways:

Wireless standards make it possible to transmit data without hardwires.

Since wireless is relatively new, there are many security risks.

Most of these risks can be combated through certain loopholes.

USB Wireless Adapters are the most versatile. If you need assistance, ask your IT Department.

Page 21: TPS Reports Presents…

Thank you! Any Questions? Ask your nearest

Byron….

Image from: http://newgrounds.com/bbs/user_images/pics/10/2964000/ngbbs411a4dc5193e3.jpg


Recommended