SlideShare a Scribd company logo
1 of 15
Network
Security
Attacks,
Wireless
Network
Security
Vignesh Suresh
TEAM
MEMBERS
Introductio
n
Types of Wireless Network
Wireless Vulnerabilities, Threats and Countermeasures
Types of Wireless Network Attacks
Securing Wireless Transmissions
CONTENTS
INTRODUCTION
A wireless network is a computer
network that uses wireless data
connections between network nodes.
Wireless networking is a method by which
homes, telecommunication networks and
business installations avoid the costly
process of introducing cables into a
building, or as a connection between
various equipment locations.
TYPES OF
WIRELESS NETWORKS
WPANs
•It stands for Wireless
personal area
networks.
•It connect devices
within a relatively
small area, that is
generally within a
person's reach.
•For example,
Bluetooth radio &
invisible infrared ligh
WLANs
•It stands for wireless
local area networks.
•It links two or more
devices over a short
distance using a
wireless distribution
method.
•It usually providing a
connection through
an access point for
internet access.
GANs
•It is a network used
for supporting
mobile across an
arbitrary number of
wireless LANs,
satellite coverage
areas, etc.
•The key challenge in
mobile
communications is
handing off user
communications
from one local
WIRELESS
COMPONENTS
WIRELESS ACCESS POINT
WIRELESS CLIENT
USER
The wireless networks consist of four basic
components.
 Wired Side
Leakage
 Rogue Access
Point
 Misconfigured
Access Point
 Wireless
Phishing
 Client
Isolation
WIRELESS MITIGATIONS &
VULNERABILITIES
 Accidental
association
 Malicious
association
 Man-in-the-
middle attack
 Denial of
service
 Network
injection
WIRELESS THREATS
SECURING WIRELESS
TRANSMISSIONS
MEASURES
Protecting the
Confidentiality of
Wireless
Transmissions
1
Securing Wireless
Access Points
2
3
Securing
Wireless Client
Devices
Securing Wireless
Networks 4
SECURING WIRELESS TRANSMISSIONS
1. Protecting the Confidentiality of Wireless
Transmissions
Signal-Hiding Techniques –
The easiest and least costly include the following: Turning off the service set
identifier (SSID) broadcasting by wireless access points, Assign cryptic names to
SSIDs, Reducing signal strength to the lowest level that still provides requisite
coverage or Locating wireless access points in the interior of the building, away
from windows and exterior walls. More effective, but also more costly methods for
reducing or hiding signals include: Using directional antennas to constrain signal
emanations within desired areas of coverage or Using of signal emanation-
shielding techniques.
Encryption –
The best method for protecting the confidentiality of information transmitted over
wireless networks is to encrypt all wireless traffic. This is especially important for
organizations subject to regulations.
2. Securing Wireless Access Points
Eliminate Rogue Access Points –
The best method for dealing with the threat of rogue access points is to
use 802.1x on the wired network to authenticate all devices that are
plugged into the network. Using 802.1x will prevent any unauthorized
devices from connecting to the network.
Secure Configuration of Authorized Access Points –
The best method for dealing with the threat of rogue access points is to
use 802.1x on the wired network to authenticate all devices that are
plugged into the network. Using 802.1x will prevent any unauthorized
devices from connecting to the network.
Use 802.1x to Authenticate all Devices –
Strong authentication of all devices attempting to connect to the network
can prevent rogue access points and other unauthorized devices from
becoming insecure backdoors. The 802.1x protocol discussed earlier
provides a means for strongly authenticating devices prior to assigning
them IP addresses.
3. Securing Wireless Client Devices.
Two major threats to wireless client
devices are :-
Loss or theft
Loss or theft of laptops and PDAs is a serious problem. laptops
and PDAs often store confidential and proprietary information.
Consequently, loss or theft of the devices may cause the
organization to be in violation of privacy regulations involving
the disclosure of personal identifying information it has
collected from third parties.
Compromise.
Another threat to wireless client devices is that they can be compromised so
that an attacker can access sensitive information stored on the device or use it
to obtain unauthorized access to other system resources.
4. Securing Wireless Networks
Use of Encryption –
The most effective way to secure your wireless network from
intruders is to encrypt, or scramble, communications over the
network. Most wireless routers, access points, and base stations
have a built-in encryption mechanism. If your wireless router
doesn’t have an encryption feature, consider getting one that does.
Manufacturers often deliver wireless routers with the encryption
feature turned off. You must turn it on.
Use anti-virus and anti-spyware software, and a firewall –
Computers on a wireless network need the same protections as any
computer connected to the Internet. Install anti-virus and anti-
spyware software, and keep them up-to-date. If your firewall was
shipped in the “off” mode, turn it on.
Change your router’s pre-set password for administration –
The manufacturer of your wireless router probably assigned it a
standard default password that allows you to set up and operate the
router. Hackers know these default passwords, so change it to
something only you know. The longer the password, the tougher it
is to crack.
Turn off your wireless network when you know you won’t use it –
Hackers cannot access a wireless router when it is shut down. If you
turn the router off when you’re not using it, you limit the amount of
time that it is susceptible to a hack.
Wireless Devices resides in Physical and Data Link Layer
A wireless network is a computer network that
uses wireless data connections between network nodes.
There are 3 types of Wireless N/W :- WPANs, WLANs & GANs
Wireless Network Security Attacks was
discussed
Wireless Network Security Measures was discussed
SUMMARY
Wireless Security

More Related Content

What's hot

Wireless security
Wireless securityWireless security
Wireless security
paripec
 

What's hot (20)

Wlan security
Wlan securityWlan security
Wlan security
 
Wlan security
Wlan securityWlan security
Wlan security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Presentation
PresentationPresentation
Presentation
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
 
wireless networking
wireless networkingwireless networking
wireless networking
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 

Similar to Wireless Security

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
Nitin kumar Gupta
 

Similar to Wireless Security (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Ch 04 wireless security
Ch 04 wireless securityCh 04 wireless security
Ch 04 wireless security
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wireless security
Wireless securityWireless security
Wireless security
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
How to hack wireless internet connections
How to hack wireless internet connectionsHow to hack wireless internet connections
How to hack wireless internet connections
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
15
1515
15
 

More from Vignesh Suresh (7)

Convolutional Neural Network
Convolutional Neural NetworkConvolutional Neural Network
Convolutional Neural Network
 
Corona
CoronaCorona
Corona
 
Software Testing
Software Testing Software Testing
Software Testing
 
Socket programming in python
Socket programming in pythonSocket programming in python
Socket programming in python
 
Microwave
MicrowaveMicrowave
Microwave
 
Iot for safety of females
Iot for safety of femalesIot for safety of females
Iot for safety of females
 
Embedded system in washing machine
Embedded system in washing machineEmbedded system in washing machine
Embedded system in washing machine
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Wireless Security

  • 3. Introductio n Types of Wireless Network Wireless Vulnerabilities, Threats and Countermeasures Types of Wireless Network Attacks Securing Wireless Transmissions CONTENTS
  • 4. INTRODUCTION A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunication networks and business installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.
  • 5. TYPES OF WIRELESS NETWORKS WPANs •It stands for Wireless personal area networks. •It connect devices within a relatively small area, that is generally within a person's reach. •For example, Bluetooth radio & invisible infrared ligh WLANs •It stands for wireless local area networks. •It links two or more devices over a short distance using a wireless distribution method. •It usually providing a connection through an access point for internet access. GANs •It is a network used for supporting mobile across an arbitrary number of wireless LANs, satellite coverage areas, etc. •The key challenge in mobile communications is handing off user communications from one local
  • 6. WIRELESS COMPONENTS WIRELESS ACCESS POINT WIRELESS CLIENT USER The wireless networks consist of four basic components.
  • 7.  Wired Side Leakage  Rogue Access Point  Misconfigured Access Point  Wireless Phishing  Client Isolation WIRELESS MITIGATIONS & VULNERABILITIES
  • 8.  Accidental association  Malicious association  Man-in-the- middle attack  Denial of service  Network injection WIRELESS THREATS
  • 9. SECURING WIRELESS TRANSMISSIONS MEASURES Protecting the Confidentiality of Wireless Transmissions 1 Securing Wireless Access Points 2 3 Securing Wireless Client Devices Securing Wireless Networks 4
  • 10. SECURING WIRELESS TRANSMISSIONS 1. Protecting the Confidentiality of Wireless Transmissions Signal-Hiding Techniques – The easiest and least costly include the following: Turning off the service set identifier (SSID) broadcasting by wireless access points, Assign cryptic names to SSIDs, Reducing signal strength to the lowest level that still provides requisite coverage or Locating wireless access points in the interior of the building, away from windows and exterior walls. More effective, but also more costly methods for reducing or hiding signals include: Using directional antennas to constrain signal emanations within desired areas of coverage or Using of signal emanation- shielding techniques. Encryption – The best method for protecting the confidentiality of information transmitted over wireless networks is to encrypt all wireless traffic. This is especially important for organizations subject to regulations.
  • 11. 2. Securing Wireless Access Points Eliminate Rogue Access Points – The best method for dealing with the threat of rogue access points is to use 802.1x on the wired network to authenticate all devices that are plugged into the network. Using 802.1x will prevent any unauthorized devices from connecting to the network. Secure Configuration of Authorized Access Points – The best method for dealing with the threat of rogue access points is to use 802.1x on the wired network to authenticate all devices that are plugged into the network. Using 802.1x will prevent any unauthorized devices from connecting to the network. Use 802.1x to Authenticate all Devices – Strong authentication of all devices attempting to connect to the network can prevent rogue access points and other unauthorized devices from becoming insecure backdoors. The 802.1x protocol discussed earlier provides a means for strongly authenticating devices prior to assigning them IP addresses.
  • 12. 3. Securing Wireless Client Devices. Two major threats to wireless client devices are :- Loss or theft Loss or theft of laptops and PDAs is a serious problem. laptops and PDAs often store confidential and proprietary information. Consequently, loss or theft of the devices may cause the organization to be in violation of privacy regulations involving the disclosure of personal identifying information it has collected from third parties. Compromise. Another threat to wireless client devices is that they can be compromised so that an attacker can access sensitive information stored on the device or use it to obtain unauthorized access to other system resources.
  • 13. 4. Securing Wireless Networks Use of Encryption – The most effective way to secure your wireless network from intruders is to encrypt, or scramble, communications over the network. Most wireless routers, access points, and base stations have a built-in encryption mechanism. If your wireless router doesn’t have an encryption feature, consider getting one that does. Manufacturers often deliver wireless routers with the encryption feature turned off. You must turn it on. Use anti-virus and anti-spyware software, and a firewall – Computers on a wireless network need the same protections as any computer connected to the Internet. Install anti-virus and anti- spyware software, and keep them up-to-date. If your firewall was shipped in the “off” mode, turn it on. Change your router’s pre-set password for administration – The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. The longer the password, the tougher it is to crack. Turn off your wireless network when you know you won’t use it – Hackers cannot access a wireless router when it is shut down. If you turn the router off when you’re not using it, you limit the amount of time that it is susceptible to a hack.
  • 14. Wireless Devices resides in Physical and Data Link Layer A wireless network is a computer network that uses wireless data connections between network nodes. There are 3 types of Wireless N/W :- WPANs, WLANs & GANs Wireless Network Security Attacks was discussed Wireless Network Security Measures was discussed SUMMARY