Parv Sharma- Wireless Security

Embed Size (px)

Citation preview

  • 7/28/2019 Parv Sharma- Wireless Security

    1/28

    A presentation on

    WIRELESS SECURITYPRESENTATION BY:

    PARV SHARMA3307409CSE 4th Yr

  • 7/28/2019 Parv Sharma- Wireless Security

    2/28

    WIRELESS

  • 7/28/2019 Parv Sharma- Wireless Security

    3/28

    Wireless is the transfer of informationover a distance without the use of electricalconductors or wires. The distances involvedmay be short (a few meters as in televisionremote control) or long (thousands or

    millionsof kilometers for radiocommunications).

  • 7/28/2019 Parv Sharma- Wireless Security

    4/28

    HISTORY OF WIRELESS

    The first wireless transmitters went on the air in theearly century using radiotelegraphy Later, as

    modulation,made it possible to transmit voices andmusic via wireless, the medium came to be called"radio." With the advent of television, fax, datacommunication, and the effective use of a largerportion of the spectrum, the term "wireless" has

    been resurrected.

  • 7/28/2019 Parv Sharma- Wireless Security

    5/28

    WHY WIRELESS ESSENTIAL

    Delivers real time information.

    Helps in quick and accurate decision making.

    Continuous supply of information whenever needed.

    Increases productivity.

    Reduces costs via more accurate and timely datacapture.

    Incorporate professionalism in the working in the

    organization.

  • 7/28/2019 Parv Sharma- Wireless Security

    6/28

    EXAMPLES OF WIRELESS EQUIPEMENTCellular phones and pagers

    Global Positioning System (GPS)

    Cordless computer peripherals

    Cordless telephone setsHome-entertainment-system control boxes

    Remote garage-door openers

    Two-way radiosBaby monitors

    Satellite Television

    Wireless LAN or local area networks

  • 7/28/2019 Parv Sharma- Wireless Security

    7/28

    TYPES OF WIRELESS NETWORK

    Wireless local area networks

    Personal area networks

    Wide area networks/ Metropolitan AreaNetwork

    Mobile Device Networks

  • 7/28/2019 Parv Sharma- Wireless Security

    8/28

    WIRELESS BROAD BAND ACCESS

    Wi-Fi

    Wi-MAX

  • 7/28/2019 Parv Sharma- Wireless Security

    9/28

    SECURITY REQUIREMENT IN WIRELESS

    Authenticity : A third party must be able to verifythat the content of a message has not been changed

    in transit.

    Nonrepudiation : The origin or the receipt of aspecific message must be verifiable by a third party.

    Accountability : The actions of an entity must be

    traceable uniquely to that entity

  • 7/28/2019 Parv Sharma- Wireless Security

    10/28

    SECURITY METHOD IN WIRELESS FIELD

    WEP (Wired Equivalent Privacy)

    SSID(Service Set Identifier)MAC(Media Access Control)

  • 7/28/2019 Parv Sharma- Wireless Security

    11/28

    INTRODUCTION TO WIRELESS NETWORK

    Wireless networks serve as the transport mechanismbetween devices and among devices and the

    traditional wired networks (enterprise networks andthe Internet).

  • 7/28/2019 Parv Sharma- Wireless Security

    12/28

    NETWORK TOPOLOGY STAR TOPOLOGY

    RING TOPOLOGY

    MESH TOPOLOGY

    BUS TOPOLOGY

    TREE TOPOLOGY

  • 7/28/2019 Parv Sharma- Wireless Security

    13/28

    WIRELESS SECURITY

    Is the prevention of unauthorized accessor damage to computers using wirelessnetworks. Wireless networks are verycommon, both for organizations andindividuals.

  • 7/28/2019 Parv Sharma- Wireless Security

    14/28

    TYPES OF UNAUTHORIZED ACCESS

    ACCIDENTIAL ASSOCIATION

    MALICIOUS ASSOCIATION

    ADHOC NETWORK NON-TRADITIONAL NETWORK

    IDENTITY THEFT

    MANIN-THE-MIDDLE ATTACKS

    DENIAL OF SERVICE

    NETWORK INJECTION

    CAFFE LATTE ATTACK

  • 7/28/2019 Parv Sharma- Wireless Security

    15/28

    ATTACK METHODS

    HUMAN ERROR

    ROGUE ACCESS POINT

    WARCHALKING

    MAC ADDRESS SPOFING

    NOISY NEIGHBOURS IMPROPER DESIGN

  • 7/28/2019 Parv Sharma- Wireless Security

    16/28

    BASIC DEFENCE IN WIRELESS SECURITY

    WEP(WIRELESS ENCRYPTION PROTOCOL)

    MAC ADDRESS BLOCKING

    DITCH THE DEFAULT BEACON INTERVALS

    CONTROLLING RESET

    DISABLE DHCP

  • 7/28/2019 Parv Sharma- Wireless Security

    17/28

    INTRODUCTION TO 802.11 SECURITY

    The IEEE 802.11 specification identified several servicesto provide a secure operating environment. The securityservices are provided largely by the Wired Equivalent

    Privacy (WEP) protocol to protect link-level data duringwireless transmission between clients and access points.WEP does not provide end-to-end security, but only forthe wireless portion of the connection.

  • 7/28/2019 Parv Sharma- Wireless Security

    18/28

    SECURITY FEATURE OF 802.11 AS STANDARD

    A.AUTHENTICATION

    B.CONFIDIENTIALITY

    C.INTEGRITY

  • 7/28/2019 Parv Sharma- Wireless Security

    19/28

    UNDERSTAND 802.11 FAMILY1.802.11

    2.802.11A

    3.802.11B

    4.802.11G

  • 7/28/2019 Parv Sharma- Wireless Security

    20/28

    FUTURE OF WIRELESS

    1.ULTRA WIDE BAND

    2.COGNITIVE RADIO

    3.MILLIMETER WAVE RADIO TECHNOLOGY

    4.MULTIMODE

    5.4G

  • 7/28/2019 Parv Sharma- Wireless Security

    21/28

    SOME SNAPS OF WIRELESS REVOLUTION

  • 7/28/2019 Parv Sharma- Wireless Security

    22/28

  • 7/28/2019 Parv Sharma- Wireless Security

    23/28

  • 7/28/2019 Parv Sharma- Wireless Security

    24/28

  • 7/28/2019 Parv Sharma- Wireless Security

    25/28

  • 7/28/2019 Parv Sharma- Wireless Security

    26/28

  • 7/28/2019 Parv Sharma- Wireless Security

    27/28

    QUESTIONS

  • 7/28/2019 Parv Sharma- Wireless Security

    28/28

    QUESTIONS