Wireless LAN security

9,545 views

Published on

0 Comments
10 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
9,545
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
1,068
Comments
0
Likes
10
Embeds 0
No embeds

No notes for slide

Wireless LAN security

  1. 1. • With Wireless Networking, no cables or wires are needed to network your computers and share your Internet connection. • WLANs offer a quick and effective extension of a wired network or standard LAN. • With a simple access point attached to the wired network, personal computers, laptops, handheld devices, printers, and other network devices can connect with the wired network at broadband speeds.
  2. 2.  ACCESS POINT  BRIDGE  NIC  ANTENNA  AAA SERVER  NMS SERVER
  3. 3.  Anyone within the geographical network range of an open, unencrypted wireless network can 'sniff' or record the traffic, gain unauthorized access to internal network resources as well as to the internet.  If router security is not activated or if the owner deactivates it for convenience, it creates a free hotspot.
  4. 4.  Rogue WLANs:-Unauthorized, “rogue” wireless LANs are clearly a foreseeable internal risk to the security, confidentiality, and integrity of customer information.  Insecure WLANs:-Insecure wireless LANs are a recognized security risk. While wireless LANs are often deployed for their productivity benefits, security is often an afterthought.  WLAN Policy violation:-WLAN policy violations are a recognized internal risk to the security, confidentiality, and integrity of customer information.
  5. 5.  Network Eavesdropping:-Because wireless communication is broadcast over radio waves, eavesdroppers who merely listen to the airwaves can easily pick up unencrypted messages. Additionally, messages encrypted with the Wired Equivalent Privacy (WEP) security protocol.  Theft of WLAN credentials:-The theft of an authorized WLAN user’s identity poses one the greatest threats. Service Set Identifiers (SSIDs) that act as crude passwords and Media Access Control (MAC) addresses that act as personal identification numbers are often used to verify that clients are authorized to connect with an access point.
  6. 6.  Insertion attacks.  Interception & unauthorized monitoring.  Jamming.  Client to client attacks.  Brute force attacks.  Encryption attacks.  Misconfigurations.
  7. 7. There are three principle ways to secure a wireless lan . 1.) For closed networks (home users and organization)configure access restrictions in the access points. 2.) For commercial providers it should to be isolated wireless network. 3.) End to end encryption.
  8. 8.  Establish wireless LAN security policies.  Design for security.  Logically separate internal networks.  Enable VPN access only.  Remove unnecessary protocols.  Restrict AP connections.  Protect wireless devices.
  9. 9. A WLAN has some specific advantages:  It is easier to add or move workstations.  It is easier to provide connectivity in areas where it is difficult to lay cable.  Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.  Access to the network can be from anywhere within range of an access point.  Portable or semi permanent buildings can be connected using a WLAN.
  10. 10. WLANs also have some disadvantages:  As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.  As standards change, it may be necessary to replace wireless cards and/or access points.  Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.  Security is more difficult to guarantee and requires configuration.  Devices will only operate at a limited distance from an access point.
  11. 11.  Like most advances, wireless LANs poses both opportunities and risks. The technology can represent a powerful complement to an organization’s networking capabilities, enabling increased employee productivity and reducing IT costs.

×