Free Essay

Wireless Network Security

In:

Submitted By 8ghty9ner
Words 3576
Pages 15
Wireless Network Security Wireless networks in personal homes are becoming more and more popular. With the ease of using no wires and the signal being broadcasted throughout the house, the new printers coming out that are network ready, and along with the new gaming systems like Playstation 3 and Xbox 360 all have wireless network settings. A wireless network is the most vulnerable network out if the precautions of taking time to set up the security properly. Everyone saves personal important information on their computer systems. When there is a wireless network with the settings not set right the computer system is fair game for any, who would like to look at information stored on the computer system. Viruses are not the only thing to protect against. Outsiders or even a neighbor can easily get into a computer’s information though a wireless network. Identity theft can even get implemented with wireless security, if you have a lot of personal information. Credit card information and bank account information can all be stolen from the system and then used for evil. Not only are personal homes affected, but businesses can be too. WarDriving is a big fad among the computer ‘hackers.’ WarDriving came from the movie “WarGames” staring Matthew Broderick. In the movie he did what was called “wardialing”. Wardialing is to keep dialing numbers that would access a computer system’s modem until you find a modem and gain access. WarDriving is where someone can drive around in a vehicle and use GPS software to map out access points (AP). Some people take WarDriving further and start accessing wireless networks using other peoples’ bandwidth and/or stealing information off the computer. There are many different programs out there used to see the wireless networks in range. One of the most popular is NetStumbler. NetStumbler scans areas using the wireless network card to find APs. Once it finds those, a GPS device is used to approximate the coordinates of the AP. This program also informs if there is an encryption on the network or not. Encryption would refer to wired equivalent privacy (WEP), WEP2, WEPplus, Wi-Fi protected Access (WPA), WPA2, and Internet Protocol security (IPsec); which we will get into later. Also many routers come with Media Access Control (MAC) address filtering, which we also will get into. There are many forms of WarDriving: WarWalking, WarSpying, and piggybacking. WarWalking is the same form of WarDriving but what you are doing is walking instead of driving around in a vehicle. With the ease of portability now of all the new technologies; PocketPCs, Nintendo DS, and PSP, WarWalking is doable without the use of a laptop computer. Piggybacking is where the law comes in. With WarDriving comes piggybacking, not always, but most of the time. Piggybacking is where WarDrivers or WarWalkers connect to a wireless network without the consent of the owner’s network. That is also where security issues come in and need to be handled. Where there is no distinct law in the United States saying that WarDriving is illegal, there has never been a lawsuit with WarDriving involved, and they have all been because of hacking into networks with out permission. WarSpying is when a WarDriver gets curious and finds a wireless video camera and hacks into the feeds and watches what the camera is taping or the stored data that the camera has already taped. Now that wireless security is a must, a wired network can be at the same risk a wireless one is. All the new laptops that are being produced come equipped with a wireless network card. Most companies don’t want to deal with the wireless network insecurities, so still have wired networks. But it is possible for a hacker to hack the wireless card on a laptop and gain access to the wired network just as it were a wireless network.

The first thing to start securing a wireless network would be changing the default password to the router and the Service Set Identifier (SSID). That is always the first mistake because the default passwords for every router can be found on the Internet. If the default password wasn’t changed and all the rest of the settings were changed then the WarDriver can reset all the settings on the router then gain access to the computer systems on the network. The WarDriver can also gain access and change all the router settings to where the owner cannot connect to the router or change the settings back on the router. Changing the SSID would make it harder for the outsider to find out what wireless router is being used. Most companies have them set to certain names when shipped out; Linksys has a SSID of “linksys” when it is shipped out. Therefore, giving the outsider a hint you are using a Linksys router and then able to find the default password for the router. Encryption is optional in a wireless network to keep outsiders out. The first in encryption is WEP; it was released in 1997. WEP was created to maintain the privacy like a normal wired network by encrypting every packet sent over the network. WEP uses a “secret” key that is shared between computer systems or anything that might be wireless and a router or AP. The key is used to encrypt the packets being sent over the network; also an integrity check is used to make sure that there weren’t any packets modified while being sent over the network. As routers and receiving network cards became more advanced, the WEP keys became able to but a higher bit. The most common bit size is 128-bit, but some companies offer a 256-bit WEP key to be used. A 128-bit key is 26 hexadecimal characters long key. Each character signify 4 bits of the key, 4 times 26 will give you 104 bits. The WEP encryption always uses 24-bit initialization vector (IV) to finish making the key. So then you add the 24 IV to the 104 bits and would leave you with 128-bit encryption. Unfortunately, WEP is considered the least secure in a wireless network. The reason is that WEP is based on the “Rivest Cipher 4” (RC4) which was created by Ron Rivest in 1987. RC4 is a pseudorandom stream of bits which is paired with plaintext and decryption is used the same way. Since RC4 is a stream cipher, the same traffic key can never be used twice transmitting over the wireless network. The job of the IV is to stop any repeating. The 24-bit IV is not long enough to make sure of this on an active network. But there is a fifty percent chance that the same IV will be repeated after 5000 packets. In 2001 a few guys; Scott Fluhrer, Itzik Mantin, and Adi Shamir published a cryptanalysis of WEP that exploits the way RC4 cipher and IV are used in WEP. Which were implemented into cracking programs which can crack a WEP key in two minutes or less. Depending on the network with data streaming across, enough IV can be gathered to crack the WEP key, if there is a lot of activity enough can be grabbed in ten minutes to forever. The only thing that slows down the process is having a longer bit key and how much data is being transmitted over the network. In 2005, the US Federal Bureau of Investigation gave a display where they cracked a network in three minutes. Since WEP was a failure, WEP2, WEPplus, and WPA were created. WEP2 is based on the same as WEP but has an enlarged IV bit value and an obligatory 128-bit encryption. The only problem is that WEP2 is still vulnerable to WEP attacks and will just slow the attacker down since they key is longer. It isn’t considered anymore secure than WEP. WEPplus (WEP+) was created to be an improvement over WEP to avoid “weak IVs”. It is only successful when WEP+ is used on both ends of the wireless network. It is possible that attacks against WEP+ will be found, but for now remains secure. WPA was intended to take the place of WEP. WPA is created to work with all wireless network cards, but not with the first generation wireless APs. WPA is a build on for WEP which increases the authentication and encryption features of it. It was created for the failing of WEP. One of the key technologies in WPA is the temporal key integrity protocol (TKIP), which addresses the encryption weakness of WEP. TKIP uses a master key at the starting point and then obtain its encryption keys mathematically from the master key, and then TKIP frequently changes the encryption keys so that the same key is never used twice. WPA uses a style called pre-shared key (PSK) that requires only a single password entered to each wireless component. Once the password is entered, the TKIP starts its business and generates and changes the WEP keys automatically. WPA still uses the RC4 stream cipher with a 128-bit key and 48-bit IV. There is a cyclic redundancy check used in WEP which is not secure, it’s possible to alter the payload and update the message cyclic redundancy check without knowing the WEP key. But Message Integrity Code (MIC) is used in WPA, along with the Michael algorithm, which is more secure. MIC includes a frame counter, which stops replay attacks being done. WPA still requires the user to set up the security but makes it easier than setting up a WEP key since there are so many different companies with different mechanisms. Sadly, there are still people who want access a network there for nothing is ever safe. With WPA outsiders can use a brute force dictionary attack. A dictionary attack is a text file with list beyond lists of words that might be a password. The only thing is that it is going to take some time for the whole list to go through and try a password. If your password is nothing of the ordinary, then it may never be cracked and your network is safe. But because of making the size of keys and IVs bigger, dropping the number of packets sent with related keys, and adding a secure message, it makes cracking WPA a lot more work. WPA2 is the final version of IEEE 802.11i and is based on the same technology WPA is but it has a new algorithm, AES-CCMP that considers it fully secure. WPA2 also uses RADIUS (which will be explained later) servers and preshared key based security. All the new aspects of WPA make it choice for wireless encryption. IPsec secures the wireless network by encrypting and authenticating each IP packet. There are two steps of IPsec which are: transport mode and tunnel mode. The transport mode the message of the packet is encrypted which can only be done over a local area network (LAN). Tunnel mode the entire packet of the IP is encrypted but can be used over a LAN or the Internet. IPsec has a few new protocols, which would be Authentication Header (AH), which gives authentication of the sender and Encapsulating Security Payload (ESP) which adds encryption of the data to make sure of confidentiality. IPsec also has a payload compression before it encrypts the data. Usually, encryption doesn’t allow full compression before the data transition. With this, compressing the data before the encryption, IPsec fixes this. IPsec can be used to make virtual private networks (VPN) in either mode. Generally IPsec is included in the kernel of an operating system and needs some setting up. MAC address filtering is one of the best options for a wireless network. Everything on a network has a MAC address. A MAC address is the hardware address used to uniquely identify each device on a network. With the original designers of Ethernet thought to use a 48-bit address space, which mean, 2 to the 48 power which will give you 281,474,976,710,656 different MAC addresses. The addresses can be a “universally administered address” or “locally administered address.” The “universally administered address” is a unique code that is assigned to a device by the manufacturer. The IEEE expects the MAC-48 and EUI-48 space to be beat around the year 2100 and the EUI-64s are not expected to run out in the near future. A MAC address is in hexadecimal and is usually separated by a colon or a dash. Every network card has this address on it somewhere. If a laptop, it’s on the bottom of the laptop somewhere, if you look at a router, it will be on a sticker somewhere on the router. MAC address filtering is used to only keep those on the list access to the network. The way to enable MAC filtering is to gain the MAC addresses of the users going to be connected to the network. Either by looking at each network device and obtaining the address from the bottom or on the sticker, or by enabling the network for the users to connect, then see which MAC addresses are on the list and write them down. Once the list of the systems that access should be allowed has been obtained, the addresses can be placed into the agent that allows access and turn on MAC filtering. Only those who have the MAC address enabled will be able to connect to the network discarding any outsiders that want to break in. If the MAC addresses were written down anywhere, make sure to discard those in a good fashion, like shredding. Nothing is full proof, though manufactures “burn in” the MAC addresses, there are programs and ways to “spoof” the MAC address. So if one wanted access now, all needing to be done is spoofing the MAC address. In Linux there are a couple of commands to change the MAC address. For Apple and Windows, there are programs to do this for you. Since there are so many different possible MAC addresses, one just guessing a MAC address is impossible. Since there are these programs to listen in, guessing doesn’t have to be, the hacker can listen on the network and can sniff out the MAC that has access to the system. There are a few other features to talk about for a wireless network. One is a static IP, if the IP assignment were disabled, then set by hand instead of having it done automatically. It makes getting into a network much harder for an outsider. Also if the subnet size was reduced from one of the standards to something that is absolutely necessary and the unused IP addresses are blocked by the router or APs firewall. The only way an attacker can get in is using a “Man in the Middle Attack.” This attack is where a cracker sets up a virtual AP on its computer and gets the other users to connect to that soft AP. After this is done, the cracker can then connect to the real AP through another wireless card on the network. Then can access important information from the computer systems. The Man in the Middle Attack is becoming easier to be done, with programs that are available on the Internet to automatically drop the users of an AP and make the wireless systems connect directly to the crackers soft AP. Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication, authorization and accounting) protocol used for remote network access. RADIUS was made to keep the crackers out, the RADIUS server was made to act as a porter through the use of using usernames and passwords that is set up by the user. The RADIUS server can also be set up to have restrictions and recording what is going on with the network, whether anyone is connecting that shouldn’t be and whatnot. Now that everything is brought out, there are successful steps in creating a secure wireless network. First of all, changing the SSID and log in password to the router or AP, since most crackers know what the default SSID is and the password to pair it with; that is never good. Your second attempt would be turning on the encryption whether it being the best (WPA2) or the weakest (WEP), something is good and going to affect the network. Disabling any file sharing makes it harder for a cracker to get access to files if they aren’t shared over the network. Turning on MAC filtering with the encryption helps a lot, incase the encryption is cracked, then the cracker has to bypass the MAC filtering which would take them longer to gain access and make them want to move to another network possibly. By also disabling the SSID broadcast, would make it harder to connect to a network since the SSID is needed to connect to a network in the first place. Though it won’t help completely, like everything else, it will slow them down which would require more time to find out the SSID, generally if you are targeted for a reason, no one would want to spend that much time to gain access to your network. Some routers and APs come with lots of tools; some can even reduce the range the signal is transmitted, which makes it harder to get a good signal from the base station. If wanted to test the strength of a network, there are a few programs that can be looked at, one is aircrack, which is used to crack WEP and WEP2 encryptions. Finding a dictionary of words to use on a WPA encryption can be found on the Internet then using any kind of brute force software to use the dictionary to crack the WPA password. Looking into MAC spoofing programs to play with and see if one of the other MAC addresses on the network can be duplicated and used with another computer. Along with spoofing, using a program like SMAC to sniff out a MAC address on a wireless network, then to spoof the address onto the wireless card. With these tools, making a secure network should be easy since it can be tested first. If you are up on your technology and are beginning to get those expensive printers that are coming out with the wireless ready, or the new gaming consoles that have the wireless capability then now everything can become secured. If you own a business or are part of a business, these security options might want to be implemented to save personal data for the company. Since there is something personal on every network, the settings for the network need to be set right to stop information leaking into the wrong hands and preventing identity theft. Keeping credit card and bank account information secure and not shared over the network helps out. Teaching employees in companies can greatly help out the security of the company. Like talked about earlier, if the laptop an employee is using on a wired network, has the wireless enabled, it’s potentially putting the company at risk. Most companies carry a lot of personal data on their network, from employee’s personal files, to corporate files that are confidential. So if an employee knows what is at risk, then they might take the precautions to not let out any of their personal information they have stored on their computer. Playing around with all the programs discussed, NetStumbler which can be obtained through the Internet will show you all the secure and insecure wireless networks in the area. Finding the manual for the router or AP will explain where to find the features discussed and how to set them up for that specific router. Then to use the programs discussed for cracking to test the security level of the network. Most people who work from home for a big corporation will discover that a secure wireless network or network is needed before any logging into servers can be done to accomplish work. Now that we know the WarDrivers aren’t the ones to be looked out for, but the ones who are “piggybacking” and doing malicious things to connect to a wireless network without permission. Since how to set up a secure wireless network was explained, now all that needs to be done is action. We know that nothing is completely secure but every little bit helps. But if there happens to be a car with an antenna and maybe dark tinted windows out in front, some abnormal activity going on with the network; a baseball bat might be in order to take care of the rest of the security problems.

Works Cited
Bradley, Tony. “Introduction to Wireless Network Security.” About. 2006. About, Inc. 20 Oct. 2006 .
Conklin, Arthur, Wm., et al. Principles of Computer Security. Burr Ridge: McGraw Hill, 2004.
Enterprise Wireless LAN Security & WLAN Monitoring. 2006. AirDefence. 21 Oct. 2006 .
Flickenger, Rob. Wireless Hacks. Sebastopol: O’Reilly, 2003.
Mitchell, Bradley. “WPA - Wi-Fi Protected Access.” About. 2006. About, Inc. 17 Oct. 2006 .
Outmesguine, Mike. Wi-Fi Toys. Indianapolis: Wiley, 2004.
The Cable Guy. “Wi-Fi Protected Access 2 (WPA2) Overview.” Microsoft. 7 June 2006. Microsoft. 19 Oct. 2006 .
“Wireless security.” Wikipedia. 9 Oct. 2006. Wikipedia. 16 Oct. 2006 .

Similar Documents

Free Essay

Wireless Network Security

...Paper CNT4514 Wireless Vulnerabilities The world of wireless networks as we all know is one of the most rapidly growing areas in our world today. With the massive amount of data that is going on, “the cloud” the security of all of our data is questioned. As well with so many of our day to day tasks relying on our wireless capabilities it make you wonder how safe is it to rely so heavily on something. We have to ask the questions what are the key vulnerabilities of wireless networks and even just of networks in general. Different types of networks have different levels of safety and it is a good idea to know not only which are safe but the vulnerabilities of said networks to keep our information out of the wrong hands and keep our day to day life moving as smoothly as possible. Unlike wired LANs the wireless LAN users are not restricted to the physical area of a wired system. While this may feel beneficial to the user it is also very beneficial to sniffing and eavesdroppers who are listening to the radio waves that are broadcasted through the air. Intercepting these packets they can pick up messages that may contain sensitive information. Seeing how the range of a wireless LAN can extend beyond the building the eavesdroppers don’t even need to be inside the building. A simple thing you can do is open up your wireless adapter on your computer and see how many open wireless networks are around you. From my house I currently have 4 open wireless networks that I can connect...

Words: 1614 - Pages: 7

Premium Essay

Wireless Networks & Network Security

...Wireless Networks & Network Security ISSC 340 Professor Vijay Venkatesh James Lange 08/13/2013 Wireless Networks are somewhat new technology in comparison to the know-how that makes them possible. The knowledge regarding wireless technology goes back about 200 years. One of the first individuals deserving recognition for today’s wireless networks is a scientist, inventor and politician named Benjamin Franklin. In 1747 he had built a model that showed how electricity could move through the air unaided by any type of wiring. In the early 1750’s Mr. Franklin started experimenting with electricity and the rest is history. Franklin was under the belief that lightening was an electrical current. So with the famous kite and key experiment he proved to himself and others that he was right. His fascination with electricity led him to later experiments with an electrical tube given to him by a friend. A second individual that played a part in today’s wireless technology is Hans Christian Oersted. In 1819 he had found that a compass needle had movement if it was presented with electrical current. This relationship between the needle and the electricity is an essential part of electromagnetism. It is said that this discovery by Oersted happened completely by chance. While preparing for one of his lectures he was setting up some of his equipment. The compass and battery were in close proximity to each other and the needle moved from magnetic north whenever the switch to the...

Words: 3213 - Pages: 13

Free Essay

Recommendations for Wireless Network Security Policy

...RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities. There were two problems with the original WEP encryption system. Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network or unintentional...

Words: 906 - Pages: 4

Free Essay

Protecting Wireless Devices and Enhancing Security in a Wireless Network

...In this ever changing world, wireless communications has become a major platform for communications at work and at home. With popular mediums (Cell phones, PDA’s, Gameboys, Wii, Netbooks, iPods, etc…) like wireless devices, there are many advantages and disadvantages in operating wirelessly. No matter how you feel about the advantages or disadvantages of the devices, they need to be protected, along with setting up some form of security. On the website Howstufworksvideo (12) they show you the basics on how to setup home Network Security. You can go there can see how it is done. Just a few years ago, (25 Sep 07) there were some so-called experts saying that there was no need to secure your wireless system. In an article, David Ramel alleges that the importance of wireless security is overhyped, that it's now trivial to secure wireless nets and that IT pros have far more serious security concerns they should be addressing -- while home users have little to lose even in the remote chance someone tries to breach their network. (3) This person was obviously living in a sheltered environment because identity theft and credit card theft was out of control then. Now he is saying don’t worry about protecting your network and to just hold on to your wallet; basically. Either he was very innocent or totally clueless and is eating humble pie about now. Here are a few disadvantages. A limited spectrum, war driving, interfering signals can be generated by other devices in the...

Words: 2804 - Pages: 12

Free Essay

Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network Using Cellular Automata

... . . . . . . . . . . . Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 3 3 4 4 4 5 6 7 7 8 8 9 . . . . . . . . . . . . . . . . . . . 10 2 Introduction 3 Wireless Sensor Network 3.1 The Basics of WSN . . . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 3.1.2 3.1.3 3.2 3.3 3.4 Components of Sensor Nodes . . . . . . . . . . . . . . . . Key Features . . . . . . . . . . . . . . . . . . . . . . . . . Types of Sensor nodes . . . . . . . . . . . . . . . . . . . . Constraints in WSNs . . . . . . . . . . . . . . . . . . . . . . . . . Applications of WSN . . . . . . . . . . . . . . . . . . . . . . . . . Security Threats in WSN . . . . . . . . . . . . . . . . . . . . . . 4 Cellular Automata 4.1 Reversible Cellular Automata 5 Deployment issues in WSN with specific focus on authentication 5.1 5.2 Authentication of Cluster Head and Base Station . . . . . . . . . Authentication of Nodes . . . . . . . . . . . . . . . . . . . . . . . 12 13 13 14 15 15 15 16 6 Schemes as well as Supporting claims 6.1 6.2 6.3 Cloning attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . Replay Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Man-in-the-middle . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Conclusion List of Figures 1 2 3 4 5 Wireless sensor Network . . . . . . . . . . . . . . . . . . . . . . . Components of Sensor Nodes . . . . . . . . . . . . . . . . . . . . WSN with three types of sensor nodes . . . . . . . . . . . . . . . Elementary...

Words: 4368 - Pages: 18

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Premium Essay

Wireless Security Policy

...Wireless security policy for a medium-sized banking organization using the following structure: Wireless Security Policy - A wireless policy for a medium-sized banking organization will needed to deploy a wireless LAN to the network and there will not need an onsite IT. The remote can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system. The Network infrastructure wills us a Cisco system for Layer 2 and 3 switching, routing platforms, and voice over IP (VoIP) along with a security management. The Cisco Integrated Services Router will give all data a robust excellence quality for service, VPN, firewall, network security, and encryption for all medium sized origination with an intrusion detection that will address the business needed. To extend the value of the wireless LAN you can use a Cisco Wireless LAN Controller Module for the environments of a medium size origination. The mobility services that are enables by the robust which will include a guest network voice by the WLAN and location tracking. The Cisco 2800 or 3800 Series Integrated Services Router will give the medium size business faster upgrades with a streamline management and a greater reliability. It’s also have a backbone for infrastructure and deploy is cost effectively along with a secure WLANs management. This will give the medium size origination the greatest wireless system secure for the enterprise. Centralized...

Words: 467 - Pages: 2

Premium Essay

Wireless Computer Research

...Meraki White Paper: Wire ess LAN Security Version 1.0, March 2009 Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security requirements for most companies and how Meraki can help them meet those challenges easily and at a low cost. Copyright © 2009 Meraki, Inc. All rights reserved. Trademarks Meraki® is a registered trademark of Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Table of Contents ( The Need For Sec rit" ###################################################################################################################### + ) What Doesn$t Work ######################################################################################################################### , * Recommended Sec rit" Architect res #############################################################################################- )!' Open with VPN !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! , )!( Shared Ke #WPA("PSK$ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - )!) User Authentication #WPA("Enterprise$ !!!!!!!!!!!!...

Words: 2275 - Pages: 10

Premium Essay

Itm425: Introduction to Computing

...Computer hardware is no longer a major barrier to wide use of wireless information systems. Wireless technology is evolving and becoming the preferred choice for connecting hardware and transferring information. Employing a wireless system allows corporations, like cruise ships, to provide a wireless service to its passengers without comprising information security. Without wireless technology this service would be impossible. To set up a basic wireless network, you will need a network card/adapter, a wireless router, and access points. The network card is the most important hardware component of wireless networking. The wireless router and access points are used to increase performance, accommodate more computers, and increase the network’s range. Network adapters are used to interface a computer to a network. They can be found as a traditional PCI card, PC Card adapter, USB adapter, media adapter, or an integrated wireless adapter chip. A wireless router allows multiple devices to access one internet connection. Through radio frequencies, data is transferred between devices connected to the network. Access points serve as the central receiver and transmitter of these radio frequencies. Other factors to consider when setting up a wireless network are compatibility, expenses, limitations due to distance and building structure, and Wi-Fi network security. Wireless network technology, also referred to as WLANs, uses an industry standard known as IEEE 802.11 that...

Words: 1299 - Pages: 6

Premium Essay

Test

...Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current...

Words: 18577 - Pages: 75

Free Essay

Wireless Communications

...Wireless Communications Paper Wireless communication involves the transmission of data from one point to another without the need to run cabling in-between. Although it seems relatively new to the end user today, it has surprisingly been around for longer than you may think dating back to the late 1800’s. The first wireless technology discovered was the Radio Frequency (RF signal). Thomas Edison and Nikola Tesla were two inventors that played a huge role in developing the RF technology we still use today. By conducting many experiments using wireless technology they together came up with the RF signal that was first implemented in WWII by the US Military. It wasn’t until the 1970s’ that the first ‘wireless network’ was developed called ALOHAnet. This new wireless network was made to communicate from island to island is Hawaii. Using LAN technologies and a 400 MHz frequency band ALOHAnet was the predecessor of many wireless technologies to come. Today we have many wireless technologies that are used for many different types of services. If you’ve used Bluetooth technology then you’ve used a Personal Area Network (PAN). A PAN network is intended for short ranges and typically controlled and used by a single person. If you’ve connected to the internet at work, a coffee shop, work, or at school then you’ve connected to part of a Wide Area Network (WAN) configured into a Local Area Network (LAN). Most people know a typical WAN by the name of WIFI, even though that’s just a business...

Words: 786 - Pages: 4

Premium Essay

Sec 572 Unit 2 Assignment

...9/13/2015 SEC-572-Network Security SYED MASTAN Professor Raef Yasin DeVry University Keller Graduate School of Management LAB-2 Assignment SOHO-NETWORK SET-UP SOHO WIRELESS NETWORK: The need and ability to work from home has increased dramatically in the past few years. With lower prices on high-speed Internet and networking equipment, many people are discovering that building and maintaining a small office/home office (SOHO) network isn’t as difficult as it used to be. The wireless or “WiFi” systems operate on a standard called 802.11 and therefore equipment from any vendor will normally work with a user’s device designed to communicate over a WiFi network. The SOHO set-up Includes: • It is a small accounting firm in a building...

Words: 1155 - Pages: 5

Free Essay

Final

...Associate Program Material Appendix J Wireless Network Plan Use the following outline to create your wireless network plan. Fill in each section of the plan as required. Deployment Scenario Infrastructure Deployment Scenario Rationale An infrastructure wireless network provides a more reliable network connection for wireless clients. If we strategically placed the stationary base we can maximum reception. Infrastructure mode networks offer the advantage of scalability, centralized security management and improved reach. Hardware Components • Component Name: Access point o Rationale for using component: Receive and transmit signal that can be picked up by any node that has the ability to receive wireless signals through a wireless network interface card. o Rough cost estimate: $100 • Component Name: Switches o Rationale for using component: Give the ability to expansion of a WLAN o Rough cost estimate: $250 • Component Name: Cables o Rationale for using component: The access point is connect to wired network with cables to give wireless access o Rough cost estimate:$10 IEEE Wireless Network Type Apex Designs has identified that an 802.11n LAN will be implemented. Access Point Management Apex Designs has decided that thin access points will be used to simplify the management of the wireless LAN. These access points allow the wireless network to be managed from one central location rather than to...

Words: 503 - Pages: 3

Premium Essay

Cvcvcv

...Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Mobile computing devices are getting smaller and more powerful, while the amount of information is growing astronomically. As the demand for connecting these devices to content-rich networks rises, WWAN technology seems like the perfect answer. But today's wireless WANs have some limitations. This white paper discusses those limitations and how NetMotion™ overcomes them. · Specialized equipment and custom applications were needed for deployment over these proprietary wireless systems. · Often the wireless infrastructures themselves were difficult to deploy. · Only a small percentage of the working population was mobile, so corporations considered wireless data deployment a significant investment with little return. Why the resurgence of interest in wireless data networking technologies now? In the late twentieth century, a few interesting social and technological developments took place. In the late 1990's, businesses began seeing the economic benefit of having employees who work away from their campuses. These remote (and sometimes nomadic) workers needed access to everyday corporate information to do their jobs. Providing workers with remote connectivity became a growing challenge for the information staff. Handheld and pocket-sized computers became powerful enough to be useful. The convergence of Internet networking technologies made IP the de facto standard. New standards such...

Words: 3176 - Pages: 13

Free Essay

Tft2

...Page 1 June 4, 2014 ABC Company Proposed revision of Information Security Policy Anthony Ronning: Information Security Manager OBJECTIVE: Due to the recent breach of our electronic health record (EHR) systems, it is necessary that policies pertaining to access and control mechanisms of health records be reviewed and/or modified to mitigate future incidents SPECIFIC GOALS: 1.) Implement a standard based on Attribute Based Access Control (ABAC) to ensure that electronic health records (EHR) are protected from unauthorized entities 2.) Implement a standard for the use of remote access methods to information systems 3.) Implement a standard that ensures that access to electronic health records (EHR) is audited and backed up without changes or over writing INFORMATION SECURITY POLICY GOALS: * Confidentiality = data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity...

Words: 2279 - Pages: 10