3. AGENDA: Wireless network overview IEEE Specifications Security considerations Security vulnerabilities Solutions and precautions Questions and comments
4. Wi-Fi is an abbreviation for Wireless Fidelity and a catch all phrase for the several different standards and recommendations that comprise wireless networking. Wi-Fi enables the user to deploy a computer network without needing to run cable throughout the facility. What is Wi-Fi:
6. IEEE 802.11.a 5GHz – 54Mbps International standard for wireless networking that operates in the 5 GHz frequency range (5.725 GHz to 5.850 GHz) with a maximum 54 Mbps data transfer rate. The 5 GHz frequency band is not as crowded as the 2.4 GHz frequency, because the 802.11a specification offers more radio channels than the 802.11b. These additional channels can help avoid radio and microwave interference. Cost of 802.11a equipment is approximately twice that of 802.11b and current deployment is limited.
7. IEEE 802.11.b 2.4GHz – 11Mbps International standard for wireless networking that operates in the 2.4 GHz frequency range (2.4 GHz to 2.4835 GHz) and provides a throughput of up to 11 Mbps with a range of just over 300 feet indoors. This is a very commonly used frequency. Microwave ovens, cordless phones, medical and scientific equipment, as well as Bluetooth devices, all work within the 2.4 GHz frequency band. 802.11b enables transfers of up to 11 Mbps. Comparable to 10BaseT in speeds, 802.11b is the most common wireless standard deployed today. In comparison T1 speeds are 1.54Mbps and DSL is normally in the 640Kbps range.
8. Securing a Wireless Network: Most wireless networks today use the 802.11 standard for communication. 802.11b became the standard wireless ethernet networking technology for both business and home in 2000. The IEEE 802.11 Standard is an interoperability standard for wireless LAN devices, that identifies three major distribution systems for wireless data communication: Direct Sequence Spread Spectrum (DSSS) Radio Technology Frequency Hopping Spread Spectrum (FHSS) Radio Technology Infrared Technology
19. rogue networks and station redirection [network administrators also rely on manufacturers' default Service Set IDentifiers (SSIDs)
20.
21. If an attacker flips a bit in the cipher text, then upon decryption, the corresponding bit in the plaintext will be flipped. Also, if an eavesdropper intercepts two cipher texts encrypted with the same key stream, it is possible to obtain the XOR of the two plaintexts. Once one of the plaintexts becomes known, it is trivial to recover all of the others.
25. Enhanced Security Network (ESN) - Extended Service Set with : enhanced authentication mechanism for both STAs and APs based on 802.11x enhanced data encapsulation using AES dynamic, association-specific cryptographic keys key management
An overview of wireless networks and it’s security implications upon us. How and why to secure a wireless network.
What exactly is Wi-Fi and it’s implications upon us
802.11g is in the final stages of development. The current draft (V5.0) is open for comments
Heavy cost bearings
Most deployments of Wireless utilize 802.11b
computers talk directly to each other
all traffic passes through a wireless access point
traffic passes through multiple wireless access points
Encryption increases privacy, but can be thwarted, either by software, or by gaining access to a PC configured with wireless and writing down the key.
Wireless does not add any additional threat in the way of viruses. Security measures such as firewalls, can reduce the risk.
The Gartner Group estimates that at least 20 percent of enterprises have rogue wireless LANs attached to their networks.
Wired Equivalent Privacy (WEP) and WEP2 . User authentication
Security doesn't stop at the perimeter of the company building.“
What's happening with wireless networks is that it's no more or less secure than anything else. It's just [that] with a wireless LAN [local area network] you need a new page in the rule book.