Your SlideShare is downloading. ×
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Module7 wireless security-b
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Module7 wireless security-b

350

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
350
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Module 7 Wireless Security Module 7
  • 2. Module Objectives
    • This module will familiarize you with the following:
      • Wi-Fi Security Issues
      • Bluetooth
      • Cell Phone Policy and Procedures
    Module 7
  • 3. Wireless Today
    • Wi-Fi [Wireless Fidelity]
    • Bluetooth
    • Infrared
    • RFID
    • Satellite / Microwave
  • 4. Wi-Fi
    • 802.11
      • b / g / a / n
    • Modes
      • Infrastructure
      • Ad-Hoc (Peer Mode)
    • SSID
    • MAC Filtering
  • 5. Wireless Networks
  • 6. Wireless Issues
    • Vulnerabilities
      • Signal Availability
      • Easy access to signals
        • Not much required ($ or equipment)
      • Signal Frequency Congestion
        • Microwave / Cordless Phone / Neighbor
      • SSID Announce
      • False Security of Encryption
  • 7. Wireless Countermeasures
    • User Awareness
    • Security Settings
      • Confining the signal
      • Disguising the label (SSID)
      • Choosing allowed parties (MAC filter)
      • Hiding the data (Encryption)
  • 8. Wireless Trends
    • Faster Speed
      • 802.11n / 802.16 (WiMax)
    • Better Security
      • Stronger Encryption
      • Authentication (802.1x)
  • 9. Wi-Fi Encryption
    • WEP
    • WPA
    • WPA2
    • EAP
  • 10. Wi-Fi Risks
    • Key Reuse (WEP is flawed)
    • Sniffing
    • Open Access (sniffed credentials)
    • Denial of Service [DoS]
    • Rogue Access Points
    • Improperly Configured APs
  • 11. Wi-Fi Tools
    • NetStumbler
    • Kismet
    • AirCrack
    • AirMagnet
    • SnifferPro
    • Ethereal
  • 12. Handhelds
    • Vulnerabilities
      • Malware
      • Theft (Device or Data)
      • Exploit wireless signal
      • Denial of Service
      • HotSync
  • 13. Handheld Countermeasures
    • Firewalls / Anti-Malware
    • Password protected
    • No unnecessary data storage
    • Encrypted transmissions
    • 2-factor authentication
    101
  • 14. Bluetooth
    • List of applications
    • A typical Bluetooth mobile phone headset
    • More prevalent applications of Bluetooth include:
    • Wireless control of and communication between a mobile phone and a hands-free headset . This was one of the earliest applications to become popular.
    • Wireless networking between PCs in a confined space and where little bandwidth is required.
    • Wireless communications with PC input and output devices, the most common being the mouse , keyboard and printer .
    • Transfer of files between devices with OBEX .
    • Transfer of contact details, calendar appointments, and reminders between devices with OBEX.
    • Replacement of traditional wired serial communications in test equipment, GPS receivers , medical equipment, bar code scanners, and traffic control devices.
    • For controls where infrared was traditionally used.
    • Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices.
    • Two seventh-generation game consoles , Nintendo's Wii [4] and Sony's PlayStation 3 use Bluetooth for their respective wireless controllers.
    • Dial-up internet access on personal computer or PDA using a data-capable mobile phone as a modem.
  • 15. Most important security weaknesses - Bluetooth
    • Problems with E0
    • Unit key
    • PIN
    • Problems with E1
    • Location privacy
    • Denial of service attacks
  • 16. Other weaknesses
    • No integrity checks
    • No prevention of replay attacks
    • Man in the middle attacks
    • Turn off discovery
    • Sometimes: default = no security
  • 17. Recommendations
    • Never use unit keys!!!!
    • Use long and sufficiently random PINs
    • Always make sure security is turned on
  • 18. Interesting solutions
    • Replace E0 and E1 with AES
    • Use MACs to protect integrity
    • Pseudonyms
    • Identity based cryptography
  • 19. Bluetooth Issues
    • Hacking Movie(s)

×