SlideShare a Scribd company logo
Wireless Ethernet
802.11 Presentation 3




                        1
How do we make a buck with
802.11
 Setup secured hot spots for client access.
  Sales force that is constantly mobile.
  Wireless internet service Provider.
 Working with communities to offer free
  WiFi.
 Combining Office networks to share one
  connection.
 Implementation of sound security for
  users. Consult and configure network
  security.

                                               2
802.11 Offers
   Roaming freedom
    ◦ No longer constrained to the office
    ◦ Smaller devices now have same function as
      laptops and tablets
    ◦ Never have to worry about access to external
      and internal network resources.
    ◦ Real Time Data Updates – Workers in the field
      can receive information in real-time.
    ◦ High Speed Data Transmission – Very close to
      LAN speeds and faster then Dial up.

                                                      3
802.11 Security and Privacy




                              4
Authentication and privacy
     Goal: to prevent unauthorized access & eavesdropping
     Realized by authentication service prior access
     Open system authentication
       ◦ station wanting to authenticate sends authentication
         management frame - receiving station sends back frame
         for successful authentication
     Shared key authentication (included in WEP*)
       ◦ Secret, shared key received by all stations by a separate,
         802.11 independent channel
       ◦ Stations authenticate by a shared knowledge of the key
         properties
     WEP’s privacy (blocking out eavesdropping) is based on
      ciphering:




                                                                       5
                                      *WEP: Wired Equivalent Privacy
802.11 Wired Encryption Protocol
    Part of 802.11 specification
    Shared key – 40/104 bits
    Initialization vector (IV) = 24 bits
    Uses RC4 for encryption
    WEP2 added, increases key length to 128 bits




http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif
http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif

                                                                               6
802.1x Access Control
•   Designed as a general purpose network access control
    mechanism
    • Not Wi-Fi specific
• Authenticate each client connected to AP (for WLAN) or switch
  port (for Ethernet)
• Authentication is done with the RADIUS server, which ”tells”
  the access point whether access to controlled ports should be
  allowed or not
    • AP forces the user into an unauthorized state
    • user send an EAP start message
    • AP return an EAP message requesting the user’s identity
    • Identity send by user is then forwared to the authentication server
      by AP
    • Authentication server authenticate user and return an accept or
      reject message back to the AP
    • If accept message is return, the AP changes the client’s state to
      authorized and normal traffic flows



                                                                            7
802.1x Access Control




                        8
Wireless Protected Access
(WPA)
•   WPA is a specification of standard based, interoperable
    security enhancements that strongly increase the level of data
    protection and access control for existing and future wireless
    LAN system.
•   User Authentication
    • 802.1x
    • EAP
•   TKIP (Temporal Key Integrity Protocol) encryption
    • RC4, dynamic encryption keys (session based)
      • 48 bit IV
      • per packet key mixing function
    • Fixes all issues found from WEP
•   Uses Message Integrity Code (MIC) Michael
    • Ensures data integrity



                                                                 9

More Related Content

What's hot

DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’ts
kieranjacobsen
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
Site24x7
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
IP Module Info Sheet nc
IP Module Info Sheet ncIP Module Info Sheet nc
IP Module Info Sheet ncRoy Thomson
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
Robb Boyd
 
TekWifi Readme
TekWifi ReadmeTekWifi Readme
TekWifi Readme
Yasin KAPLAN
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol SecurityDavid Barker
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
Muhammad Usman
 
Open Audit
Open AuditOpen Audit
Open Audit
ncspa
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
Cadariu Cristian
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
KHNOG
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
Robb Boyd
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
Bibekananada Jena
 
Belkinslide
BelkinslideBelkinslide
Belkinslide
kat09jones
 
Azure Network and Infrastructure
Azure Network and InfrastructureAzure Network and Infrastructure
Azure Network and Infrastructure
Phi Huynh
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
ManageEngine, Zoho Corporation
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
Richard Harvey
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
Alex de Jong
 

What's hot (20)

DirectAccess, do’s and don’ts
DirectAccess, do’s and don’tsDirectAccess, do’s and don’ts
DirectAccess, do’s and don’ts
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
IP Module Info Sheet nc
IP Module Info Sheet ncIP Module Info Sheet nc
IP Module Info Sheet nc
 
Cisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your NetworkCisco Network Insider: Three Ways to Secure your Network
Cisco Network Insider: Three Ways to Secure your Network
 
TekWifi Readme
TekWifi ReadmeTekWifi Readme
TekWifi Readme
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Secure your LAN
Secure your LANSecure your LAN
Secure your LAN
 
Mikrotik Hotspot User Manager
Mikrotik Hotspot User ManagerMikrotik Hotspot User Manager
Mikrotik Hotspot User Manager
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
Belkinslide
BelkinslideBelkinslide
Belkinslide
 
Azure Network and Infrastructure
Azure Network and InfrastructureAzure Network and Infrastructure
Azure Network and Infrastructure
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
 
Cloud Architecture
Cloud ArchitectureCloud Architecture
Cloud Architecture
 
Da for dummies techdays 2012
Da for dummies techdays 2012Da for dummies techdays 2012
Da for dummies techdays 2012
 

Viewers also liked

82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
82   jan-roger linna - 6913005 - system and methodology for purging fuel from...82   jan-roger linna - 6913005 - system and methodology for purging fuel from...
82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
Mello_Patent_Registry
 
クロームインストール8
クロームインストール8クロームインストール8
クロームインストール8support Kato
 
урок 8. единицы измерения информации
урок 8. единицы измерения информацииурок 8. единицы измерения информации
урок 8. единицы измерения информацииОльга Тигунцева
 
Моя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир ДенисМоя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир Денисsch426media
 
801tecinformaticaiip
801tecinformaticaiip801tecinformaticaiip
801tecinformaticaiip
Deisy Rincón Diaz
 
일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)  일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)
kwwa
 
Андрей Юнисов
Андрей ЮнисовАндрей Юнисов
Андрей Юнисов
Ontico
 
Моя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков КириллМоя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков Кириллsch426media
 
Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Business incubator HSE
 
ใบงานหน่วยที่8
ใบงานหน่วยที่8ใบงานหน่วยที่8
ใบงานหน่วยที่8Amnuay
 
看護管理8月号2011
看護管理8月号2011看護管理8月号2011
看護管理8月号2011
Sakata Masatoshi
 
8.ανασκοπηση αποχαιρετισμος
8.ανασκοπηση  αποχαιρετισμος8.ανασκοπηση  αποχαιρετισμος
8.ανασκοπηση αποχαιρετισμος
maradask
 
820107145132....hbpe2103
820107145132....hbpe2103820107145132....hbpe2103
820107145132....hbpe2103'Muliana Dasrun
 
קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14
eshaki
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
Mark McHenry
 
8 27 session 2
8 27 session 28 27 session 2
8 27 session 2
nblock
 

Viewers also liked (20)

82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
82   jan-roger linna - 6913005 - system and methodology for purging fuel from...82   jan-roger linna - 6913005 - system and methodology for purging fuel from...
82 jan-roger linna - 6913005 - system and methodology for purging fuel from...
 
クロームインストール8
クロームインストール8クロームインストール8
クロームインストール8
 
урок 8. единицы измерения информации
урок 8. единицы измерения информацииурок 8. единицы измерения информации
урок 8. единицы измерения информации
 
Моя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир ДенисМоя страна - Россия. Мангир Денис
Моя страна - Россия. Мангир Денис
 
801tecinformaticaiip
801tecinformaticaiip801tecinformaticaiip
801tecinformaticaiip
 
일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)  일하는여성 81호(본문)(2010.1.27)
일하는여성 81호(본문)(2010.1.27)
 
811288 slides
811288 slides811288 slides
811288 slides
 
Андрей Юнисов
Андрей ЮнисовАндрей Юнисов
Андрей Юнисов
 
απλή αρμονική ταλάντωση8
απλή αρμονική ταλάντωση8απλή αρμονική ταλάντωση8
απλή αρμονική ταλάντωση8
 
8.2.1measure
8.2.1measure8.2.1measure
8.2.1measure
 
Моя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков КириллМоя страна - Россия. Зыков Кирилл
Моя страна - Россия. Зыков Кирилл
 
Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8Курс Евгения Савина "Займись делом!", Занятие 8
Курс Евгения Савина "Займись делом!", Занятие 8
 
ใบงานหน่วยที่8
ใบงานหน่วยที่8ใบงานหน่วยที่8
ใบงานหน่วยที่8
 
看護管理8月号2011
看護管理8月号2011看護管理8月号2011
看護管理8月号2011
 
8.ανασκοπηση αποχαιρετισμος
8.ανασκοπηση  αποχαιρετισμος8.ανασκοπηση  αποχαιρετισμος
8.ανασκοπηση αποχαιρετισμος
 
82 gcps-2010 tto vih
82 gcps-2010 tto vih82 gcps-2010 tto vih
82 gcps-2010 tto vih
 
820107145132....hbpe2103
820107145132....hbpe2103820107145132....hbpe2103
820107145132....hbpe2103
 
קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14קו למושב, גיליון 823 - 20/02/14
קו למושב, גיליון 823 - 20/02/14
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 
8 27 session 2
8 27 session 28 27 session 2
8 27 session 2
 

Similar to 802 11 3

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technologytardeep
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_kRama Krishna M
 
4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
Marcus Dempsey
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
SagarBedarkar3
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson
 

Similar to 802 11 3 (20)

wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wifi
WifiWifi
Wifi
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
Iuwne10 S04 L02
Iuwne10 S04 L02Iuwne10 S04 L02
Iuwne10 S04 L02
 

More from rphelps

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Eventrphelps
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connectrphelps
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staffrphelps
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencingrphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 
802 11 2
802 11 2802 11 2
802 11 2rphelps
 

More from rphelps (6)

Instructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare EventInstructions For Adding Content To Slideshare Event
Instructions For Adding Content To Slideshare Event
 
Using adobe connect
Using adobe connectUsing adobe connect
Using adobe connect
 
May2011 d7staff
May2011 d7staffMay2011 d7staff
May2011 d7staff
 
Video Conferencing
Video ConferencingVideo Conferencing
Video Conferencing
 
802 11 2
802 11 2802 11 2
802 11 2
 
802 11 2
802 11 2802 11 2
802 11 2
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 

802 11 3

  • 2. How do we make a buck with 802.11  Setup secured hot spots for client access. Sales force that is constantly mobile. Wireless internet service Provider.  Working with communities to offer free WiFi.  Combining Office networks to share one connection.  Implementation of sound security for users. Consult and configure network security. 2
  • 3. 802.11 Offers  Roaming freedom ◦ No longer constrained to the office ◦ Smaller devices now have same function as laptops and tablets ◦ Never have to worry about access to external and internal network resources. ◦ Real Time Data Updates – Workers in the field can receive information in real-time. ◦ High Speed Data Transmission – Very close to LAN speeds and faster then Dial up. 3
  • 5. Authentication and privacy  Goal: to prevent unauthorized access & eavesdropping  Realized by authentication service prior access  Open system authentication ◦ station wanting to authenticate sends authentication management frame - receiving station sends back frame for successful authentication  Shared key authentication (included in WEP*) ◦ Secret, shared key received by all stations by a separate, 802.11 independent channel ◦ Stations authenticate by a shared knowledge of the key properties  WEP’s privacy (blocking out eavesdropping) is based on ciphering: 5 *WEP: Wired Equivalent Privacy
  • 6. 802.11 Wired Encryption Protocol  Part of 802.11 specification  Shared key – 40/104 bits  Initialization vector (IV) = 24 bits  Uses RC4 for encryption  WEP2 added, increases key length to 128 bits http://i.msdn.microsoft.com/Aa503279.Native_802_11_wep(en-us,MSDN.10).gif http://www.cs.wustl.edu/~jain/cse574-06/ftp/wireless_security/fig14.gif 6
  • 7. 802.1x Access Control • Designed as a general purpose network access control mechanism • Not Wi-Fi specific • Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet) • Authentication is done with the RADIUS server, which ”tells” the access point whether access to controlled ports should be allowed or not • AP forces the user into an unauthorized state • user send an EAP start message • AP return an EAP message requesting the user’s identity • Identity send by user is then forwared to the authentication server by AP • Authentication server authenticate user and return an accept or reject message back to the AP • If accept message is return, the AP changes the client’s state to authorized and normal traffic flows 7
  • 9. Wireless Protected Access (WPA) • WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system. • User Authentication • 802.1x • EAP • TKIP (Temporal Key Integrity Protocol) encryption • RC4, dynamic encryption keys (session based) • 48 bit IV • per packet key mixing function • Fixes all issues found from WEP • Uses Message Integrity Code (MIC) Michael • Ensures data integrity 9