12
Wireless communication Wireless communication is the transfer of is the transfer of information information over a over a distance without the use of electrical conductors or distance without the use of electrical conductors or "wires". The distances involved may be short (a few meters "wires". The distances involved may be short (a few meters as in television remote control) or very long (thousands or as in television remote control) or very long (thousands or even millions of kilometers for radio communications). When even millions of kilometers for radio communications). When the context is clear the term is often simply shortened to the context is clear the term is often simply shortened to "wireless". Wireless communications is generally considered "wireless". Wireless communications is generally considered to be a branch of telecommunications. to be a branch of telecommunications. It encompasses various types of fixed, mobile, and portable It encompasses various types of fixed, mobile, and portable two way radios, cellular telephones, personal digital two way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples assistants (PDAs), and wireless networking. Other examples of of wireless technology wireless technology include GPS units, garage door openers include GPS units, garage door openers and or garage doors, wireless computer mice and keyboards, and or garage doors, wireless computer mice and keyboards, satellite television and cordless telephones. satellite television and cordless telephones.

Advantage and factors involving risk on the following topics

Embed Size (px)

DESCRIPTION

- PowerPoint PPT Presentation

Citation preview

Page 1: Advantage and factors involving risk on the following topics

Wireless communicationWireless communication is the transfer of is the transfer of informationinformation over a distance without over a distance without the use of electrical conductors or "wires". The distances involved may be short the use of electrical conductors or "wires". The distances involved may be short (a few meters as in television remote control) or very long (thousands or even (a few meters as in television remote control) or very long (thousands or even millions of kilometers for radio communications). When the context is clear the millions of kilometers for radio communications). When the context is clear the term is often simply shortened to "wireless". Wireless communications is term is often simply shortened to "wireless". Wireless communications is generally considered to be a branch of telecommunications.generally considered to be a branch of telecommunications.It encompasses various types of fixed, mobile, and portable two way radios, It encompasses various types of fixed, mobile, and portable two way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of Other examples of wireless technologywireless technology include GPS units, garage door openers include GPS units, garage door openers and or garage doors, wireless computer mice and keyboards, satellite television and or garage doors, wireless computer mice and keyboards, satellite television and cordless telephones.and cordless telephones.

Page 2: Advantage and factors involving risk on the following topics

Advantage and factors involving risk on the following topicsAdvantage and factors involving risk on the following topics

One of the major problems that presents itself is the already limited spectrum One of the major problems that presents itself is the already limited spectrum available for communications. The remaining free spectrum has to be used to available for communications. The remaining free spectrum has to be used to its maximum potential, spread spectrum technology presenting itself as a its maximum potential, spread spectrum technology presenting itself as a suitable means of increasing performance. Splitting up of the environment into suitable means of increasing performance. Splitting up of the environment into a number of small cells also increases the overall accessible bandwidth of the a number of small cells also increases the overall accessible bandwidth of the communication system, but also increases the cost as more cell sites are communication system, but also increases the cost as more cell sites are required. Techniques such as diversity combining can also be used to increase required. Techniques such as diversity combining can also be used to increase the available bandwidth through improved reception capabilities. the available bandwidth through improved reception capabilities. Where a large number of devices, each being of a low power, are transmitting, a Where a large number of devices, each being of a low power, are transmitting, a sizable amount of radio power is being generated. The effects of radio sizable amount of radio power is being generated. The effects of radio communication on human health are being examined communication on human health are being examined [19][19], however much more , however much more work is required in this area before large scale communication systems are work is required in this area before large scale communication systems are developed. developed. The unconstrained nature of the communication medium of radio requires the The unconstrained nature of the communication medium of radio requires the issue of network security to be addressed. Verification of communication issue of network security to be addressed. Verification of communication entities must also be performed to ensure that only registered devices may entities must also be performed to ensure that only registered devices may communicate using the network, and that only registered devices may receive communicate using the network, and that only registered devices may receive the data. Some form of encryption may be required for communications to the data. Some form of encryption may be required for communications to avoid interception of data transmitted over the network by devices not taking avoid interception of data transmitted over the network by devices not taking part in the communications. part in the communications.

Page 3: Advantage and factors involving risk on the following topics

In addition to security considerations from external devices accessing the In addition to security considerations from external devices accessing the network, interfering signals can be generated by other devices in the office network, interfering signals can be generated by other devices in the office environment, for example printers and other electromechanical devices. These environment, for example printers and other electromechanical devices. These devices can temporarily disrupt a communication link through the noise that devices can temporarily disrupt a communication link through the noise that they generate. they generate. A wireless communication system has a number of advantages, not least the A wireless communication system has a number of advantages, not least the mobility of the devices within the environment. It is a simple matter to relocate mobility of the devices within the environment. It is a simple matter to relocate a communicating device, and no additional cost of rewiring and excessive a communicating device, and no additional cost of rewiring and excessive downtime is associated with such a move. It is also a simple matter to add in a downtime is associated with such a move. It is also a simple matter to add in a communication device to the system or remove one from the system without communication device to the system or remove one from the system without any disruption to the remainder of the system. Other than the initial outlay on any disruption to the remainder of the system. Other than the initial outlay on setting up the cell sites, the cost of running and maintaining a radio based setting up the cell sites, the cost of running and maintaining a radio based communications solution is minimal. These, and other factors, show the appeal communications solution is minimal. These, and other factors, show the appeal that a radio communication system has for the office environment. that a radio communication system has for the office environment.

Page 4: Advantage and factors involving risk on the following topics

State any laws and the punishment of the crime enforce by State any laws and the punishment of the crime enforce by the law makersthe law makers

Republic Act 8792, signed into law last June 14, 2000, is a landmark law in the Republic Act 8792, signed into law last June 14, 2000, is a landmark law in the history of the Philippines. Not only has this bill made the country a legitimate history of the Philippines. Not only has this bill made the country a legitimate player in the global marketplace. The Philippine Internet community has played player in the global marketplace. The Philippine Internet community has played a major role in pushing for its passage. The law took effect last June 19, 2000. a major role in pushing for its passage. The law took effect last June 19, 2000. With the Philippines relaxed stock market listing rules plus a proposed vibrant With the Philippines relaxed stock market listing rules plus a proposed vibrant investment priorities program in place, Filipinos here and abroad and its investment priorities program in place, Filipinos here and abroad and its foreign partners have something to look forward for. foreign partners have something to look forward for. Here's the salient features of RA8792: Here's the salient features of RA8792: It gives legal recognition of electronic data messages, electronic documents, It gives legal recognition of electronic data messages, electronic documents, and electronic signatures. and electronic signatures. Allows the formation of contracts in electronic form. Allows the formation of contracts in electronic form. Makes banking transactions done through ATM switching networks absolute Makes banking transactions done through ATM switching networks absolute once consummated. once consummated. Parties are given the right to choose the type and level of security methods that Parties are given the right to choose the type and level of security methods that suit their needs. suit their needs. Provides the mandate for the electronic implementation of transport documents Provides the mandate for the electronic implementation of transport documents to facilitate carriage of goods. This includes documents such as, but not limited to facilitate carriage of goods. This includes documents such as, but not limited to, multi-modal, airport, road, rail, inland waterway, courier, post receipts, to, multi-modal, airport, road, rail, inland waterway, courier, post receipts, transport documents issued by freight forwarders, marine/ocean bill of lading, transport documents issued by freight forwarders, marine/ocean bill of lading, non-negotiable seaway bill, charter party bill of lading. non-negotiable seaway bill, charter party bill of lading.

Page 5: Advantage and factors involving risk on the following topics

Actions taken on such risk on the company concern the Actions taken on such risk on the company concern the government and you.government and you.

Wireless networking is easy to set up, and it's convenient, especially if you like Wireless networking is easy to set up, and it's convenient, especially if you like to move around the house or office without your portable computer while to move around the house or office without your portable computer while staying connected. But because they use the airwaves, wireless staying connected. But because they use the airwaves, wireless communications are more vulnerable to interception and attack than a wired communications are more vulnerable to interception and attack than a wired connection. Here are some tips for securing your wireless network.connection. Here are some tips for securing your wireless network.1. Use encryption1. Use encryptionEncryption is the number one security measure, but many wireless access points Encryption is the number one security measure, but many wireless access points (WAPs) don't have encryption enabled by default. Although most WAPs support the (WAPs) don't have encryption enabled by default. Although most WAPs support the Wired Equivalent Privacy (WEP) protocol, it's not enabled by default. WEP has a Wired Equivalent Privacy (WEP) protocol, it's not enabled by default. WEP has a number of security flaws, and a knowledgeable hacker can crack it, but it's better than number of security flaws, and a knowledgeable hacker can crack it, but it's better than no encryption at all. Be sure to set the WEP authentication method for "shared key" no encryption at all. Be sure to set the WEP authentication method for "shared key" rather than "open system". The latter does not encrypt the data; it only authenticates rather than "open system". The latter does not encrypt the data; it only authenticates the client. Change the WEP key frequently and use 128-bit WEP rather than 40-bit.the client. Change the WEP key frequently and use 128-bit WEP rather than 40-bit.2. Use strong encryption2. Use strong encryptionBecause of WEP's weaknesses, you should use the Wi-Fi Protected Access (WPA) Because of WEP's weaknesses, you should use the Wi-Fi Protected Access (WPA) protocol instead of WEP if possible. To use WPA, your WAP must support it (you may protocol instead of WEP if possible. To use WPA, your WAP must support it (you may be able to add support to an older WAP with a firmware upgrade); your wireless be able to add support to an older WAP with a firmware upgrade); your wireless network access cards (NICs) must support it (again, a firmware update may be network access cards (NICs) must support it (again, a firmware update may be necessary); and your wireless client software must support it. Windows XP Service necessary); and your wireless client software must support it. Windows XP Service Pack 2 installs the WPA client. SP1 machines can be updated to support WPA by Pack 2 installs the WPA client. SP1 machines can be updated to support WPA by installing the Windows WPA client with the Wireless Update Rollup Package — see installing the Windows WPA client with the Wireless Update Rollup Package — see this this pagepage for more details. Another encryption option is to use IPsec, if your wireless for more details. Another encryption option is to use IPsec, if your wireless router supports it.router supports it.

Page 6: Advantage and factors involving risk on the following topics

3. Change the default administrative password3. Change the default administrative passwordMost manufacturers use the same default administrative Most manufacturers use the same default administrative password for all their wireless access points (or at least, password for all their wireless access points (or at least, all those of a particular model). Those default passwords all those of a particular model). Those default passwords are common knowledge among hackers, who can use are common knowledge among hackers, who can use them to change your WAP settings. The first thing you them to change your WAP settings. The first thing you should do when you set up a WAP is change the default should do when you set up a WAP is change the default password to a strong password (eight characters or password to a strong password (eight characters or more in length, using a combination of alpha and more in length, using a combination of alpha and numeric characters, not using words that are in the numeric characters, not using words that are in the dictionary).dictionary).

Page 7: Advantage and factors involving risk on the following topics

4. Turn off SSID broadcasting4. Turn off SSID broadcastingThe Service Set Identifier (SSID) is the name of your wireless network. By default, most The Service Set Identifier (SSID) is the name of your wireless network. By default, most WAPs broadcast the SSID. This makes it easy for users to find the network, as it shows WAPs broadcast the SSID. This makes it easy for users to find the network, as it shows up on their list of available networks on their wireless client computers. If you turn off up on their list of available networks on their wireless client computers. If you turn off broadcasting, users will have to know the SSID to connect. Some folks will tell you that broadcasting, users will have to know the SSID to connect. Some folks will tell you that turning off SSID broadcasting is useless because a hacker can use packet sniffing turning off SSID broadcasting is useless because a hacker can use packet sniffing software to capture the SSID even if broadcasting is turned off. That's true, but why make software to capture the SSID even if broadcasting is turned off. That's true, but why make it easier for them? That's like saying burglars can buy lockpicks, so locking the door is it easier for them? That's like saying burglars can buy lockpicks, so locking the door is useless. Turning off broadcasting won't deter a serious hacker, but it will protect from the useless. Turning off broadcasting won't deter a serious hacker, but it will protect from the casual "piggybacker" (for example, a next door neighbor who notices the new network casual "piggybacker" (for example, a next door neighbor who notices the new network and decides to try connecting "just for fun").and decides to try connecting "just for fun").5. Turn off the WAP when not in use5. Turn off the WAP when not in useThis one may seem simplistic, but few companies or individuals do it. If you have This one may seem simplistic, but few companies or individuals do it. If you have wireless users connecting only at certain times, there's no reason to run the wireless wireless users connecting only at certain times, there's no reason to run the wireless network all the time and provide an opportunity for intruders. You can turn off the access network all the time and provide an opportunity for intruders. You can turn off the access point when it's not in use — such as at night when everyone goes home and there is no point when it's not in use — such as at night when everyone goes home and there is no need for anyone to connect wirelessly.need for anyone to connect wirelessly.6. Change the default SSID6. Change the default SSIDManufacturers provide a default SSID, often the equipment name (such as Linksys). The Manufacturers provide a default SSID, often the equipment name (such as Linksys). The purpose of turning off SSID broadcasting was to prevent others from knowing the purpose of turning off SSID broadcasting was to prevent others from knowing the network name, but if you use the default name, it's not too difficult to guess. As network name, but if you use the default name, it's not too difficult to guess. As mentioned, hackers can use tools to sniff the SSID, so don't change the name to mentioned, hackers can use tools to sniff the SSID, so don't change the name to something that gives them information about you or your company (such as the company something that gives them information about you or your company (such as the company name or your physical address).name or your physical address).

Page 8: Advantage and factors involving risk on the following topics

7. Use MAC filtering7. Use MAC filteringMost WAPs (although not some of the cheapest ones) will allow you to use media access Most WAPs (although not some of the cheapest ones) will allow you to use media access control (MAC) address filtering. This means you can set up a "white list" of computers that are control (MAC) address filtering. This means you can set up a "white list" of computers that are allowed to connect to your wireless network, based on the MAC or physical addresses allowed to connect to your wireless network, based on the MAC or physical addresses assigned to their network cards. Communications from MAC addresses that aren't on the list assigned to their network cards. Communications from MAC addresses that aren't on the list will be refused.will be refused.The method isn't foolproof, since it's possible for hackers to capture packets transmitted over The method isn't foolproof, since it's possible for hackers to capture packets transmitted over the wireless network and determine a valid MAC address of one of your users and then spoof the wireless network and determine a valid MAC address of one of your users and then spoof the address. But it does make things more difficult for a would-be intruder, and that's what the address. But it does make things more difficult for a would-be intruder, and that's what security is really all about.security is really all about.

8. Isolate the wireless network from the rest of the LAN8. Isolate the wireless network from the rest of the LANTo protect your wired internal network from threats coming over the wireless network, create a To protect your wired internal network from threats coming over the wireless network, create a wireless DMZ or perimeter network that's isolated from the LAN. That means placing a firewall wireless DMZ or perimeter network that's isolated from the LAN. That means placing a firewall between the wireless network and the LAN. Then you can require that in order for any wireless between the wireless network and the LAN. Then you can require that in order for any wireless client to access resources on the internal network, he or she will have to authenticate with a client to access resources on the internal network, he or she will have to authenticate with a remote access server and/or use a VPN. This provides an extra layer of protection.remote access server and/or use a VPN. This provides an extra layer of protection.9. Control the wireless signal9. Control the wireless signalThe typical 802.11b WAP transmits up to about 300 feet. However, this range can be extended The typical 802.11b WAP transmits up to about 300 feet. However, this range can be extended by a more sensitive antenna. By attaching a high gain external antenna to your WAP, you can by a more sensitive antenna. By attaching a high gain external antenna to your WAP, you can get a longer reach but this may expose you to war drivers and others outside your building. A get a longer reach but this may expose you to war drivers and others outside your building. A directional antenna will transmit the signal in a particular direction, instead of in a circle like directional antenna will transmit the signal in a particular direction, instead of in a circle like the omnidirectional antenna that usually comes built into the WAP. Thus, through antenna the omnidirectional antenna that usually comes built into the WAP. Thus, through antenna selection you can control both the signal range and its direction to help protect from selection you can control both the signal range and its direction to help protect from outsiders. In addition, some WAPs allow you to adjust signal strength and direction via their outsiders. In addition, some WAPs allow you to adjust signal strength and direction via their settings.settings.

Page 9: Advantage and factors involving risk on the following topics

10. Transmit on a different frequency10. Transmit on a different frequencyOne way to "hide" from hackers who use the more common 802.11b/g One way to "hide" from hackers who use the more common 802.11b/g wireless technology is to go with 802.11a instead. Since it operates on wireless technology is to go with 802.11a instead. Since it operates on a different frequency (the 5 GHz range, as opposed to the 2.4 GHz a different frequency (the 5 GHz range, as opposed to the 2.4 GHz range in which b/g operate), NICs made for the more common wireless range in which b/g operate), NICs made for the more common wireless technologies won't pick up its signals. Sure, this is a type of "security technologies won't pick up its signals. Sure, this is a type of "security through obscurity" — but it's perfectly valid when used in conjunction through obscurity" — but it's perfectly valid when used in conjunction with other security measures. After all, security through obscurity is with other security measures. After all, security through obscurity is exactly what we advocate when we tell people not to let others know exactly what we advocate when we tell people not to let others know their social security numbers and other identification information.their social security numbers and other identification information.A drawback of 802.11a, and one of the reasons it's less popular than A drawback of 802.11a, and one of the reasons it's less popular than b/g, is that the range is shorter: about half the distance of b/g. It also b/g, is that the range is shorter: about half the distance of b/g. It also has difficulty penetrating walls and obstacles. From a security has difficulty penetrating walls and obstacles. From a security standpoint, this "disadvantage" is actually an advantage, as it makes it standpoint, this "disadvantage" is actually an advantage, as it makes it more difficult for an outsider to intercept the signal even with more difficult for an outsider to intercept the signal even with equipment designed for the technology.equipment designed for the technology.

Page 10: Advantage and factors involving risk on the following topics

Implementation on law enforcersImplementation on law enforcers

Routine police work requires effectiveRoutine police work requires effectivecoordination and communication withcoordination and communication withother police agencies, fire departments,other police agencies, fire departments,emergency medical services, and publicemergency medical services, and publicservice organizations. High-profile incidents—service organizations. High-profile incidents—such as bombings, plane crashes,such as bombings, plane crashes,and natural disasters—test the ability ofand natural disasters—test the ability ofpublic safety and public service organizationspublic safety and public service organizationsto mount a well-coordinatedto mount a well-coordinatedresponse. Interoperability, the ability ofresponse. Interoperability, the ability ofdifferent agencies to communicate acrossdifferent agencies to communicate acrossjurisdictions with each other, oftenjurisdictions with each other, often

Page 11: Advantage and factors involving risk on the following topics

depends on wireless radio communicationdepends on wireless radio communicationsystems.systems.This 1997 NIJ-sponsored study, conductedThis 1997 NIJ-sponsored study, conductedby the National Law Enforcementby the National Law Enforcementand Corrections Technology Center, focusesand Corrections Technology Center, focuseson interoperability issues in the lawon interoperability issues in the lawenforcement community. It is based on aenforcement community. It is based on asurvey of the interoperability experiencessurvey of the interoperability experiencesand needs of law enforcement agenciesand needs of law enforcement agenciesacross the Nation.1 (See “Methodology” foracross the Nation.1 (See “Methodology” fora discussion of the sampling and analysisa discussion of the sampling and analysis

Page 12: Advantage and factors involving risk on the following topics

This study confirms and quantifiesThis study confirms and quantifiesmuch of what is already “known” aboutmuch of what is already “known” aboutlaw enforcement agencies’ use of telecommunicationslaw enforcement agencies’ use of telecommunicationsequipment for routineequipment for routineoperations and for interoperability, althoughoperations and for interoperability, althoughthere are a few surprises. Thethere are a few surprises. Thefindings are organized into four categories:findings are organized into four categories:telecommunications equipmenttelecommunications equipmentand infrastructure, knowledgeand infrastructure, knowledgeof interoperability standards, interoperabilityof interoperability standards, interoperabilityexperience and requirements,experience and requirements,and interoperability shortfalls.and interoperability shortfalls.TelecommunicationsTelecommunicationsequipment and infrastructureequipment and infrastructureMobile radios, whether handheld orMobile radios, whether handheld orvehicle-mounted, are basic law enforcementvehicle-mounted, are basic law enforcementcommunications equipment.communications equipment.State agencies and sheriff ’s departmentsState agencies and sheriff ’s departmentsare more likely to use citizensare more likely to use citizensband and amateur radios, but agenciesband and amateur radios, but agenciesof all sizes and types use cellularof all sizes and types use cellularphones and pagers. The sharing of frequenciesphones and pagers. The sharing of frequenciesand/or infrastructure (e.g.,and/or infrastructure (e.g.,transmitters and repeaters) is verytransmitters and repeaters) is verycommon, and most agencies that sharecommon, and most agencies that shareradio systems remain involved in makingradio systems remain involved in makingdecisions related to their system.decisions related to their system.Land mobile radio (LMR) technology.Land mobile radio (LMR) technology.Most agencies have conventionalMost agencies have conventionalanalog systems and operate in highanalog systems and operate in highVHF bands, but information fromVHF bands, but information fromagencies that were planning to replaceagencies that were planning to replaceor upgrade their systems within 10or upgrade their systems within 10years, 46 percent of the total, indicatedyears, 46 percent of the total, indicatedseveral trends: (1) the number ofseveral trends: (1) the number ofagencies operating in 800 MHz5 willagencies operating in 800 MHz5 willmore than double, growing from 23 tomore than double, growing from 23 to51 percent; (2) the number of agencies51 percent; (2) the number of agencies