• Save
Wireless Intrusion Prevention Systems or WIPS
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Wireless Intrusion Prevention Systems or WIPS

  • 4,542 views
Uploaded on

This presentation is about Wireless Intrusion Prevention System also known as WIPS. It is a technology that is required to solve the security threats due to insecure or unmanaged use of WiFi......

This presentation is about Wireless Intrusion Prevention System also known as WIPS. It is a technology that is required to solve the security threats due to insecure or unmanaged use of WiFi equipments in a corporate network .

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • good
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
4,542
On Slideshare
4,535
From Embeds
7
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
1
Likes
5

Embeds 7

http://www.slideshare.net 7

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. W I PS?
  • 2. W I PS stands for Wireless Intrusion Prevention Systems
  • 3. It provides security cover to wireless infrastructure
  • 4. Security is the protection of Assets
  • 5. How ?
  • 6. Lock
  • 7. Watch
  • 8. or Monitor
  • 9. In Information Technology
  • 10. Security is the protection of Assets ^ Information
  • 11. How ?
  • 12. … through the use of T raining, P rocesses and T echnology
  • 13. Internet Firewall shields inside from outside Outside is insecure Network (LAN) is confined to wires Inside is secure Conventional LAN
  • 14. Internet Wireless security holes bypass the firewall Network not confined to wires or the building anymore Firewall shields inside from outside Wireless LAN
  • 15. RF Signal can’t be contained within a physical boundary Hence, spillage of RF signals causes serious security threats…
  • 16. Examples of WiFi Security Threats Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Key Cracking External Users Rogue AP Misconfigured AP Firewall, Wired IPS Wireless DoS Ad hoc Connections
  • 17. Why not just ban WiFi?
  • 18. Simply having a “No WiFi” policy does not make you immune to WiFi Threats
  • 19. So, What can we do about it ?
  • 20. Lock and … … Monitor
  • 21. How ?
  • 22. WPA/WPA2 to Lock Down WiFi Network Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Rogue AP Misconfigured AP Firewall, Wired IPS Wireless DoS WPA, WPA2 Ad hoc Connections
  • 23. Misconfigured AP Adhoc connections Firewall Wired IPS SPAM URL filtering WPA, WPA2 Rogue AP WIPS to cover Wireless Infrastructure Eavesdropping Unauthorized Access Wi-Phishing Honeypots External APs Cracking External Users Wireless DoS
  • 24. Wireless Intrusion Prevention System (WIPS) Detect WiFi misuse and attacks Block WiFi misuse and attacks Locate WiFi devices
  • 25. Md Sohail Ahmad [email_address] Thank You! The Global Leader in Wireless Security Solutions www.airtightnetworks.com