SlideShare a Scribd company logo
Wi-Fi
the
802.11 Standard
and
Security
What is Wi-Fi?
 Short for wireless fidelity.
 It is a wireless technology that uses radio
frequency to transmit data through the air.
 Wi-Fi is based on the 802.11 standard:
– 802.11a
– 802.11b
– 802.11g
Wi-Fi Alliance
 Non-profit standards organization.
 Global organization that created the Wi-Fi
brand name.
 Formerly the Wireless Ethernet Compatibility
Alliance.
Wi-Fi Certification
 The Wi-Fi CERTIFIED logo from the Wi-Fi Alliance.
– Rigorous interoperability testing requirements.
– Certifies the interoperability of 802.11 products from the
many different vendors.
Wi-Fi HotSpots
 Pay Services
– Boingo
– iPass
– Cingular Wireless
– MyConnect
– WayPort
 Free Wi-Fi in Springfield:
– Downtown: Springfield Chamber of Commerce
– Mud House
– Panera Bread
Brief History
 IEEE (Institute of Electrical and Electronics
Engineers) established the 802.11 Group in 1990.
Specifications for standard ratified in 1997.
 Initial speeds were 1 and 2 Mbps.
 IEEE modified the standard in 1999 to include:
– 802.11b
– 802.11a
– 802.11g was added in 2003.
 IEEE Created standard, but Wi-Fi Alliance certifies
products
802.11 Standard
 802.11 is primarily concerned
with the lower layers of the OSI
model.
 Data Link Layer
– Logical Link Control (LLC).
– Medium Access Control (MAC).
 Physical Layer
– Physical Layer Convergence
Procedure (PLCP).
– Physical Medium Dependent
(PMD).
802.11b Standard
 Well-supported, stable, and cost effective, but runs in
the 2.4 GHz range that makes it prone to
interference from other devices (microwave ovens,
cordless phones, etc) and also has security
disadvantages.
 Limits the number of access points in range of each
other to three.
 Has 11 channels, with 3 non-overlapping, and
supports rates from 1 to 11 Mbps, but realistically
about 4-5 Mbps max.
 Uses direct-sequence spread-spectrum technology.
802.11g Standard
 Extension of 802.11b, with the same disadvantages
(security and interference).
 Has a shorter range than 802.11b.
 Is backwards compatible with 802.11b so it allows or
a smooth transition from 11b to 11g.
 Flexible because multiple channels can be combined
for faster throughput, but limited to one access point.
 Runs at 54 Mbps, but realistically about 20-25 Mbps
and about 14 Mbps when b associated
 Uses frequency division multiplexing
802.11a Standard
 Completely different from 11b and 11g.
 Flexible because multiple channels can be combined
for faster throughput and more access points can be
co-located.
 Shorter range than 11b and 11g.
 Runs in the 5 GHz range, so less interference from
other devices.
 Has 12 channels, 8 non-overlapping, and supports
rates from 6 to 54 Mbps, but realistically about 27
Mbps max
 Uses frequency division multiplexing
Advantages
 Freedom – You can work from any location
that you can get a signal.
 Setup Cost – No cabling required.
 Flexibility – Quick and easy to setup in temp
or permanent space.
 Scaleable – Can be expanded with growth.
 Mobile Access – Can access the network on
the move.
Disadvantages
 Speed – Slower than cable.
 Range – Affected by various medium.
– Travels best through open space.
– Reduced by walls, glass, water, etc
 Security – Greater exposure to risks.
– Unauthorized access.
– Compromising data.
– Denial of service.
Basic Security Strategies
 Block your Service Set Identifier (SSID) from being
broadcast.
– Wireless beacon so PCs can easily find the access point.
 Change the default network name in the access
point.
 Change the default access point password.
 Center the access point in the middle of the
building/house.
Media Access Control (MAC) Filtering
 Every network device has a unique MAC
address
– Allocated by the manufacturer.
 MAC Filtering only allows certain addresses
access.
 Mostly for home use.
– Tedious to implement on a large scale
Wired Equivalency Protocol (WEP)
 Basic encryption technology.
– Uses an RC4 stream cipher.
 Pseudo-random bytes.
– Two versions: 64-bit and 128-bit versions.
 Built into Wi-Fi certified equipment.
– Implemented at the MAC level.
 Protects radio signal between device and access point.
– Does not protect data beyond the access point.
 Uses static encryption keys.
– Easy to crack.
 Still better then nothing.
Wi-Fi Protected Access (WPA)
 Designed to replace WEP.
– Firmware update.
– 128-bit Temporal Key Integrity Protocol (TKIP) encryption.
 Uses a master key that is regularly changed.
– User authentication.
– Data Integrity.
 Protects radio signal between device and access point.
 Built into Wi-Fi certified equipment.
– Implemented at the MAC level.
 Available in two versions:
– WPA2 Personal.
– WPA2 Enterprise.
Wi-Fi Protected Access 2 (WPA2)
 Designed to replace WEP.
– 128-bit Advanced Encryption Standard (AES).
 Based on the IEEE 802.11i standard.
 Provides government level security.
 Also available in two versions:
– WPA2 Personal.
– WPA2 Enterprise.
Extended EAP
 EAP - Extensible Authentication Protocol.
 Addition to the Wi-Fi Protected Access.
– Used in internal network.
 Extra security for enterprise and government
Wi-Fi LANs.
 Several versions available.
Virtual Private Network (VPN)
 Creates a secure virtual “tunnel” from remote device
to VPN server.
– Creates an encryption scheme.
– Requires authentication.
 Works across the internet.
 Many types and levels of VPN technology.
– May include hardware and software components.
– Some very expensive.
– Windows provides a basic implementation in its server
software.
Firewall
 Can make the network or computer invisible to the internet.
 Block unauthorized users.
 Monitor and control flow of data to/from a network or computer.
 Many types and levels of firewall technology.
– Hardware and software combinations
– Software only versions.
 ZoneAlarm
 Many devices provide basic firewall capability.
– Gateways and access points.
 Network address translation.
– Windows XP operating system.
Kerberos
 Created at MIT.
 Network authentication based on key
distribution.
– Nodes provide their own authentication.
 Checks for data stream integrity.
– Checks for modification.
 Uses Data Encryption Standard (DES).
Bringing it all together
 Any combination of these security techniques
can be used.
 The more security the more of a hassle.
– Important when supporting users.

More Related Content

What's hot

Wireless standards
Wireless standards Wireless standards
Wireless standards
Ajay Suresh
 
zigbee technology
zigbee technologyzigbee technology
zigbee technologyDeep Hundal
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
 
Zigbee technology [autosaved]
Zigbee technology [autosaved]Zigbee technology [autosaved]
Zigbee technology [autosaved]
vandjadhav
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
Mostafa Ali
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
N.CH Karthik
 
Introduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBeeIntroduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBee
Chiu-Hao Chen (Ted)
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
Amit Dixit
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
naimish12
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
Nimi T
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
Srujana Aryasomayajula
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
Serma Pavi
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
Arkaprava Sadhu
 
Zig Bee
Zig BeeZig Bee
Zig Bee
Vishwa Mohan
 
Developing Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit EcosystemDeveloping Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit Ecosystem
Silicon Labs
 
zigbee communication
zigbee communicationzigbee communication
zigbee communication
ROBIN MOJUMDER
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
Ibrahim Kazanci
 
Zigbee - Building Smart Homes
Zigbee - Building Smart HomesZigbee - Building Smart Homes
Zigbee - Building Smart Homes
Omer Ali
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Premier Farnell
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
anku3
 

What's hot (20)

Wireless standards
Wireless standards Wireless standards
Wireless standards
 
zigbee technology
zigbee technologyzigbee technology
zigbee technology
 
Wireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBeeWireless Communication And Mobile Network - ZigBee
Wireless Communication And Mobile Network - ZigBee
 
Zigbee technology [autosaved]
Zigbee technology [autosaved]Zigbee technology [autosaved]
Zigbee technology [autosaved]
 
The Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFiThe Differences Between Bluetooth, ZigBee and WiFi
The Differences Between Bluetooth, ZigBee and WiFi
 
zigbee technology
zigbee technology zigbee technology
zigbee technology
 
Introduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBeeIntroduction to Ti wireless solution: ZigBee
Introduction to Ti wireless solution: ZigBee
 
Introduction to zigbee
Introduction to zigbeeIntroduction to zigbee
Introduction to zigbee
 
ZIGBEE NETWORKS
ZIGBEE NETWORKSZIGBEE NETWORKS
ZIGBEE NETWORKS
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
 
Tech sem on zig 1
Tech sem on zig 1Tech sem on zig 1
Tech sem on zig 1
 
Zigbee technology
Zigbee technologyZigbee technology
Zigbee technology
 
Zigbee- The Future of Data Communications
Zigbee- The Future of Data CommunicationsZigbee- The Future of Data Communications
Zigbee- The Future of Data Communications
 
Zig Bee
Zig BeeZig Bee
Zig Bee
 
Developing Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit EcosystemDeveloping Accessories for the Apple HomeKit Ecosystem
Developing Accessories for the Apple HomeKit Ecosystem
 
zigbee communication
zigbee communicationzigbee communication
zigbee communication
 
ZigBee Technology
ZigBee TechnologyZigBee Technology
ZigBee Technology
 
Zigbee - Building Smart Homes
Zigbee - Building Smart HomesZigbee - Building Smart Homes
Zigbee - Building Smart Homes
 
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139Wireless Microcontroller  (IEEE802.15.4 and ZigBee): JN5139
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
 

Viewers also liked

Natural Hazards
Natural HazardsNatural Hazards
Natural Hazards
Rowel Adane
 
Smoking Cigarette
Smoking CigaretteSmoking Cigarette
Smoking Cigarette
Rowel Adane
 
Micromax
MicromaxMicromax
Micromax
kendre1234
 
GRADE 7 MATH LEARNING GUIDE
GRADE 7 MATH LEARNING GUIDEGRADE 7 MATH LEARNING GUIDE
GRADE 7 MATH LEARNING GUIDE
Charielopezmaglinte
 
Project gym recorection
Project gym recorectionProject gym recorection
Project gym recorection
fazal khan
 
History of Calculus
History of CalculusHistory of Calculus
History of Calculus
Rowel Adane
 
The Muscular System
The Muscular SystemThe Muscular System
The Muscular System
Rowel Adane
 

Viewers also liked (8)

Natural Hazards
Natural HazardsNatural Hazards
Natural Hazards
 
CV_(1)[1]
CV_(1)[1]CV_(1)[1]
CV_(1)[1]
 
Smoking Cigarette
Smoking CigaretteSmoking Cigarette
Smoking Cigarette
 
Micromax
MicromaxMicromax
Micromax
 
GRADE 7 MATH LEARNING GUIDE
GRADE 7 MATH LEARNING GUIDEGRADE 7 MATH LEARNING GUIDE
GRADE 7 MATH LEARNING GUIDE
 
Project gym recorection
Project gym recorectionProject gym recorection
Project gym recorection
 
History of Calculus
History of CalculusHistory of Calculus
History of Calculus
 
The Muscular System
The Muscular SystemThe Muscular System
The Muscular System
 

Similar to Wi fi

Wi-Fi
Wi-FiWi-Fi
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
Shubham Singh
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networkspptpmuthumca51
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
Gurpreet Singh
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
Bill Drew
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
kouyepwanko
 
Darsh
DarshDarsh
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
RiazAhmad521284
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
Bhushan Jadhav
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
Hem Pokhrel
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
JAI MCA-STUDENT
 

Similar to Wi fi (20)

Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wifi ppt
Wifi pptWifi ppt
Wifi ppt
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
wirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdfwirelessnetworks-ppt-140909071911-phpapp02.pdf
wirelessnetworks-ppt-140909071911-phpapp02.pdf
 
Wireless
WirelessWireless
Wireless
 
Darsh
DarshDarsh
Darsh
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
wireless networks.pptx
wireless networks.pptxwireless networks.pptx
wireless networks.pptx
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)Wireless Fidelity (WiFi)
Wireless Fidelity (WiFi)
 
Wireless Fidelity
Wireless FidelityWireless Fidelity
Wireless Fidelity
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 

Wi fi

  • 2. What is Wi-Fi?  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is based on the 802.11 standard: – 802.11a – 802.11b – 802.11g
  • 3. Wi-Fi Alliance  Non-profit standards organization.  Global organization that created the Wi-Fi brand name.  Formerly the Wireless Ethernet Compatibility Alliance.
  • 4. Wi-Fi Certification  The Wi-Fi CERTIFIED logo from the Wi-Fi Alliance. – Rigorous interoperability testing requirements. – Certifies the interoperability of 802.11 products from the many different vendors.
  • 5. Wi-Fi HotSpots  Pay Services – Boingo – iPass – Cingular Wireless – MyConnect – WayPort  Free Wi-Fi in Springfield: – Downtown: Springfield Chamber of Commerce – Mud House – Panera Bread
  • 6. Brief History  IEEE (Institute of Electrical and Electronics Engineers) established the 802.11 Group in 1990. Specifications for standard ratified in 1997.  Initial speeds were 1 and 2 Mbps.  IEEE modified the standard in 1999 to include: – 802.11b – 802.11a – 802.11g was added in 2003.  IEEE Created standard, but Wi-Fi Alliance certifies products
  • 7. 802.11 Standard  802.11 is primarily concerned with the lower layers of the OSI model.  Data Link Layer – Logical Link Control (LLC). – Medium Access Control (MAC).  Physical Layer – Physical Layer Convergence Procedure (PLCP). – Physical Medium Dependent (PMD).
  • 8. 802.11b Standard  Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages.  Limits the number of access points in range of each other to three.  Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max.  Uses direct-sequence spread-spectrum technology.
  • 9. 802.11g Standard  Extension of 802.11b, with the same disadvantages (security and interference).  Has a shorter range than 802.11b.  Is backwards compatible with 802.11b so it allows or a smooth transition from 11b to 11g.  Flexible because multiple channels can be combined for faster throughput, but limited to one access point.  Runs at 54 Mbps, but realistically about 20-25 Mbps and about 14 Mbps when b associated  Uses frequency division multiplexing
  • 10. 802.11a Standard  Completely different from 11b and 11g.  Flexible because multiple channels can be combined for faster throughput and more access points can be co-located.  Shorter range than 11b and 11g.  Runs in the 5 GHz range, so less interference from other devices.  Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max  Uses frequency division multiplexing
  • 11. Advantages  Freedom – You can work from any location that you can get a signal.  Setup Cost – No cabling required.  Flexibility – Quick and easy to setup in temp or permanent space.  Scaleable – Can be expanded with growth.  Mobile Access – Can access the network on the move.
  • 12. Disadvantages  Speed – Slower than cable.  Range – Affected by various medium. – Travels best through open space. – Reduced by walls, glass, water, etc  Security – Greater exposure to risks. – Unauthorized access. – Compromising data. – Denial of service.
  • 13. Basic Security Strategies  Block your Service Set Identifier (SSID) from being broadcast. – Wireless beacon so PCs can easily find the access point.  Change the default network name in the access point.  Change the default access point password.  Center the access point in the middle of the building/house.
  • 14. Media Access Control (MAC) Filtering  Every network device has a unique MAC address – Allocated by the manufacturer.  MAC Filtering only allows certain addresses access.  Mostly for home use. – Tedious to implement on a large scale
  • 15. Wired Equivalency Protocol (WEP)  Basic encryption technology. – Uses an RC4 stream cipher.  Pseudo-random bytes. – Two versions: 64-bit and 128-bit versions.  Built into Wi-Fi certified equipment. – Implemented at the MAC level.  Protects radio signal between device and access point. – Does not protect data beyond the access point.  Uses static encryption keys. – Easy to crack.  Still better then nothing.
  • 16. Wi-Fi Protected Access (WPA)  Designed to replace WEP. – Firmware update. – 128-bit Temporal Key Integrity Protocol (TKIP) encryption.  Uses a master key that is regularly changed. – User authentication. – Data Integrity.  Protects radio signal between device and access point.  Built into Wi-Fi certified equipment. – Implemented at the MAC level.  Available in two versions: – WPA2 Personal. – WPA2 Enterprise.
  • 17. Wi-Fi Protected Access 2 (WPA2)  Designed to replace WEP. – 128-bit Advanced Encryption Standard (AES).  Based on the IEEE 802.11i standard.  Provides government level security.  Also available in two versions: – WPA2 Personal. – WPA2 Enterprise.
  • 18. Extended EAP  EAP - Extensible Authentication Protocol.  Addition to the Wi-Fi Protected Access. – Used in internal network.  Extra security for enterprise and government Wi-Fi LANs.  Several versions available.
  • 19. Virtual Private Network (VPN)  Creates a secure virtual “tunnel” from remote device to VPN server. – Creates an encryption scheme. – Requires authentication.  Works across the internet.  Many types and levels of VPN technology. – May include hardware and software components. – Some very expensive. – Windows provides a basic implementation in its server software.
  • 20. Firewall  Can make the network or computer invisible to the internet.  Block unauthorized users.  Monitor and control flow of data to/from a network or computer.  Many types and levels of firewall technology. – Hardware and software combinations – Software only versions.  ZoneAlarm  Many devices provide basic firewall capability. – Gateways and access points.  Network address translation. – Windows XP operating system.
  • 21. Kerberos  Created at MIT.  Network authentication based on key distribution. – Nodes provide their own authentication.  Checks for data stream integrity. – Checks for modification.  Uses Data Encryption Standard (DES).
  • 22. Bringing it all together  Any combination of these security techniques can be used.  The more security the more of a hassle. – Important when supporting users.