19. Securing Wireless Networks.pdf
(
208 KB
)
Pobierz
Securing Wireless
Networks
Security Fundamentals
Instructor: Don Jones
Securing Wireless Networks
Security Fundamentals
In This Lesson:
SSIDs
Keys
MAC Filters
Pros and Cons
Securing Wireless Networks
Security Fundamentals
Why Wireless?
•
Wireless networks continue to become more popular and
prevalent.
•
They’re an attacker’s dream come true – data transmitted over
the air is easy to intercept.
•
Securing these networks has become extremely important.
Securing Wireless Networks
Security Fundamentals
SSIDs
•
The Service Set Identifier (SSID) identifies a wireless network
and advertises its presence.
•
Wireless access points can be configured to not broadcast an
SSID, which helps to hide the network but only from casual
attacks.
•
Serious attackers can detect the network transmissions without
the SSID.
Securing Wireless Networks
Security Fundamentals
Keys
•
The best way to defend a wireless network is to encrypt the
traffic being transmitted.
•
WEP: Wired Equivalency Privacy
•
WPA and WPA2: Wi-Fi Protected Access
–
Shared-key
–
802.1X
Securing Wireless Networks
Security Fundamentals
MAC Filters
•
These tell a wireless network’s hardware to only accept
connections from authorized MAC addresses.
•
MAC addresses are encoded into a wireless network transceiver
at the factory.
•
Enterprise-class wireless hardware can often draw from a
centrally managed list of authorized MAC addresses.
Securing Wireless Networks
Security Fundamentals
Pros and Cons
•
WEP: Not very secure – easily cracked.
•
WPA/WPA2: Secure, relatively easy to set up and manage.
•
MAC filtering: Secure, but challenging in large or dynamic
environments.
•
SSID silencing: Not secure, but provides an illusion of security.
Securing Wireless Networks
Security Fundamentals
What We Covered
SSIDs
Keys
MAC Filters
Pros and Cons
Plik z chomika:
morek3333
Inne pliki z tego folderu:
01. Getting Started with Security Fundamentals.pdf
(242 KB)
03. Physical Security as the First Line of Defense.pdf
(201 KB)
02. Introducing Security.pdf
(209 KB)
05. Authentication Basics.pdf
(281 KB)
07. Using Encryption to Protect Data.pdf
(233 KB)
Inne foldery tego chomika:
MP3
Zgłoś jeśli
naruszono regulamin