19. Securing Wireless Networks.pdf

(208 KB) Pobierz
Securing Wireless
Networks
Security Fundamentals
Instructor: Don Jones
Securing Wireless Networks
Security Fundamentals
In This Lesson:
SSIDs
Keys
MAC Filters
Pros and Cons
Securing Wireless Networks
Security Fundamentals
Why Wireless?
Wireless networks continue to become more popular and
prevalent.
They’re an attacker’s dream come true – data transmitted over
the air is easy to intercept.
Securing these networks has become extremely important.
1123952546.050.png 1123952546.061.png 1123952546.071.png 1123952546.082.png 1123952546.001.png 1123952546.002.png 1123952546.003.png 1123952546.004.png 1123952546.005.png 1123952546.006.png 1123952546.007.png 1123952546.008.png 1123952546.009.png 1123952546.010.png 1123952546.011.png 1123952546.012.png 1123952546.013.png 1123952546.014.png 1123952546.015.png 1123952546.016.png 1123952546.017.png 1123952546.018.png 1123952546.019.png 1123952546.020.png 1123952546.021.png 1123952546.022.png 1123952546.023.png 1123952546.024.png 1123952546.025.png 1123952546.026.png 1123952546.027.png 1123952546.028.png 1123952546.029.png 1123952546.030.png 1123952546.031.png 1123952546.032.png 1123952546.033.png
 
Securing Wireless Networks
Security Fundamentals
SSIDs
The Service Set Identifier (SSID) identifies a wireless network
and advertises its presence.
Wireless access points can be configured to not broadcast an
SSID, which helps to hide the network but only from casual
attacks.
Serious attackers can detect the network transmissions without
the SSID.
Securing Wireless Networks
Security Fundamentals
Keys
The best way to defend a wireless network is to encrypt the
traffic being transmitted.
WEP: Wired Equivalency Privacy
WPA and WPA2: Wi-Fi Protected Access
Shared-key
802.1X
Securing Wireless Networks
Security Fundamentals
MAC Filters
These tell a wireless network’s hardware to only accept
connections from authorized MAC addresses.
MAC addresses are encoded into a wireless network transceiver
at the factory.
Enterprise-class wireless hardware can often draw from a
centrally managed list of authorized MAC addresses.
1123952546.034.png 1123952546.035.png 1123952546.036.png 1123952546.037.png 1123952546.038.png 1123952546.039.png 1123952546.040.png 1123952546.041.png 1123952546.042.png 1123952546.043.png 1123952546.044.png 1123952546.045.png 1123952546.046.png 1123952546.047.png 1123952546.048.png 1123952546.049.png 1123952546.051.png 1123952546.052.png 1123952546.053.png 1123952546.054.png 1123952546.055.png 1123952546.056.png 1123952546.057.png 1123952546.058.png 1123952546.059.png 1123952546.060.png 1123952546.062.png 1123952546.063.png 1123952546.064.png 1123952546.065.png 1123952546.066.png 1123952546.067.png
 
Securing Wireless Networks
Security Fundamentals
Pros and Cons
WEP: Not very secure – easily cracked.
WPA/WPA2: Secure, relatively easy to set up and manage.
MAC filtering: Secure, but challenging in large or dynamic
environments.
SSID silencing: Not secure, but provides an illusion of security.
Securing Wireless Networks
Security Fundamentals
What We Covered
SSIDs
Keys
MAC Filters
Pros and Cons
1123952546.068.png 1123952546.069.png 1123952546.070.png 1123952546.072.png 1123952546.073.png 1123952546.074.png 1123952546.075.png 1123952546.076.png 1123952546.077.png 1123952546.078.png 1123952546.079.png 1123952546.080.png 1123952546.081.png 1123952546.083.png 1123952546.084.png 1123952546.085.png 1123952546.086.png 1123952546.087.png 1123952546.088.png 1123952546.089.png 1123952546.090.png
 
Zgłoś jeśli naruszono regulamin