Security for Wireless Computing. Anthony Gauvin

Size: px
Start display at page:

Download "Security for Wireless Computing. Anthony Gauvin"

Transcription

1 Running head: SECURITY FOR WIRELESS COMPUTING Security for Wireless Computing 1 Security for Wireless Computing Anthony Gauvin

2 Security for Wireless Computing 2 Abstract Many corporations and small business are moving to wireless technologies for their local area networks without a complete understanding of the security risks involved. According to published research, many of the original security solutions to wireless local area network (WLAN) security are inherently weak and do not provide adequate security. Newer, more robust, wireless security technologies are being developed but have not had widespread acceptance within corporate information infrastructures. Corporations and organizations with wireless networks are at risk. This paper seeks to educate Information Technology managers and professionals about the security risks of WLAN technologies and provide some viable approaches to securing a wireless network.

3 Security for Wireless Computing 3 Table of Contents Introduction... 4 How Wireless Computing Works... 4 Security Issues with WLANS... 7 Existing Wireless Security Solutions... 9 New Solutions to Wireless Security Conclusions References... 21

4 Security for Wireless Computing 4 Security for Wireless Computing Introduction One of the more exciting information technologies to come about in the last several years was wireless computing. No longer do computer users have to be tied to massive desktop computers to accomplish their daily tasks. With a wireless enabled laptop or personal digital assistant (PDA), employees can roam freely throughout office buildings while continuing to work and converse on organizational information networks. The freedom to roam and work has increased productivity and morale, earning praise for wireless networks from workers and management alike. The information technology personnel are also enamored of wireless computing. It has reduced the cost of providing networks since the cost of wireless access points and the supporting wireless access cards is much less than the cost of running data wiring to each computer enabled office.(lewis, 2004) The physical work involved in deploying wireless networks is also decreased. It is no wonder that wireless networks grew at such rapid rates. All this growth quickly stalled however, when wireless security concerns became known. How Wireless Computing Works A discussion of the relative insecurity of wireless computing cannot begin until a discussion of how wireless computing was originally designed is presented. The insecurity

5 Security for Wireless Computing 5 of wireless computing originates from the desire of the designers of wireless computing to provide roaming, unencumbered access to computer networks for wireless users. This desire to provide free, open and easy access to computer networks often conflicts with many organizations desire to keep their data safe from prying eyes. Security and wireless computing is simply a case of you can t have your cake and eat it too. The dominant wireless networking standard is defined in the Institute for Electrical and Electronics Engineers (IEEE) specifications for wireless Ethernet networks. This is a publicly available specification and the intent is to have all wireless vendors adhere to the specification and insure interoperability of components from competitors. The three most popular wireless local area network (WLAN) standards are a, b and g b is the market leader with g quickly gaining ground. All three standards are similar in operation and are differentiated by bandwidth and the frequency band of the signals transmitted and received. The insecurity of WLAN is not manifested in the bandwidth or frequency of operation so we will refer to WLANs in general and not to any specific standard. (Siegel, Levine, & Siegel, 2004) WLANs operate in one of two modes, ad-hoc or infrastructure. Ad-hoc defines a method of wireless computer peers to exchange data without a predefined network infrastructure and has not met with great success. The infrastructure mode of operation is predominantly used for

6 Security for Wireless Computing 6 construction of wireless networks and requires two components; wireless access point(s) connected to a traditional wired network and wireless network interface card(s) installed into the computing devices. The access points act as electronic bridges, converting and translating data from the wireless network to wired networks and vice versa. Access points can be deployed singly or in groups called a distribution system. The wireless network interface cards installed in the computers converse with the access point(s) and through the access point(s) can access to the wired networks and other wireless computing devices. (Krouse & Ross, 2002) Wireless enabled computing devices must gain knowledge of the access points in order to establish communications with the network. The process of learning about available wireless network is called association. The method of identification for association is a Service Set Identifier or SSID. This SSID can either be entered into the computer manually or discovered dynamically. In the case of manually inserted information, the computing device must then broadcast this SSID in search of the correct access point to respond, establish communications and create the association. Dynamic configuration requires the access points to broadcast a beacon frame announcing its presence with the correct SSID in the beacon frame for the wireless computing devices to respond and create the association. (Arbaugh, Shankar, & Wan, 2001) An analogy would be that either the device shouts the correct name (SSID) out or

7 Security for Wireless Computing 7 the access points do. The association is created when the other side responds Yes, that s me. Here I am. Once an association is created between the access point and the wireless computing device, the computing device becomes a peer on wireless network and through the access point bridging capabilities, a peer on the wired network. The association process corresponds to the plugging in of a network cable between a device and the network on a wired network. Organizational network policy may require other authentication and configuration protocol after association but generally whatever protocol are established for the computers physically wired to the network apply to the wireless computers also. Security Issues with WLANS It should be become very obvious from the previous discussion that limitations of access was not a design concern for WLAN, in fact, ease of access was the primary concern. The process of association on WLANs is easily subverted. A miscreant computer user merely has to get his computer to lie about the SSID to become a peer on a WLAN. If the wireless access point is broadcasting beacon frames, than the miscreant computer user merely has to respond in the affirmative and access is gained. If the access point is silent, the miscreant computer waits for any other device to create an association with the access and then mimic the electronic conversations of the other device to gain access. This process of gaining access has become a popular

8 Security for Wireless Computing 8 activity with hackers and has been termed War-Driving. (Berghel, 2004) War-driving relies on the nature of radio frequency (RF) propagation of the wireless access point and wireless devices. While different standards determine different frequencies and power requirements for transmitting and receiving RF signals, a good assumption is the WLAN RF propagation has a range of about 100 feet. The area in which the signals from a wireless device can be utilized is about a one acre large circle centered on the device. Clearly, WLAN RF propagation can extend beyond the building and even beyond the property owned by the organization that deployed the wireless devices. As a result, access to the wireless network is available to a hacker, with the right equipment, that is driving by on a publicly accessible roadway or parked in the corporate parking lot. These hackers can do more than just access and listen. They can mount denial-of service attacks; insert viruses, worms and spam into the networks; and do other mischief. (Panko, 2004, p. 239) The standard method for securing data from prying eyes is encryption. The WLAN standards include Wired Equivalent Privacy (WEP) encryption protocol. WEP is a symmetric (one-key) encryption protocol that uses a static shared key that must be known both to the access point and the wireless enabled devices before encryption can occur. This shared key is used to both authenticate the access point and wireless devices to each other and to encrypt the data sent between them. (Campbell, Calvert, & Boswell, 2003) WEP was intended to provide the same level of

9 Security for Wireless Computing 9 security that was available on wired networks. The reality however is that WEP has severe mathematical flaws and an attacker can break the encryption code easily with freely available software from the Internet. (Liska, 2003) The greatest security hole created by WLAN technology is the ease and low cost of deployment. Several networking venders are selling Do it yourself WLAN kits that cost under $100 to purchase and deploy. Many companies are finding rogue WLANs in their corporation information infrastructures set-up by employees that wanted all the advantages of the WLANS but did not want bother the IT folks to set-up a WLAN for them. These rouge WLAN are often deployed with none of the security options enabled since most of the do-it-yourself installers have no knowledge of the inherent security risks of WLANs. An organization that has implemented a progressive security policy becomes just as vulnerable as one that hasn t as these rogue WLANs become open door invitations for hackers. (Pescatore, 2004) Existing Wireless Security Solutions The are many existing solutions to providing security for wireless networks and in this section we will discuss the first generation of these security solutions along with some reasons why these solutions do not provide the desired level of security. Security was not a concern for the original development of WLAN so most these solutions were implemented

10 Security for Wireless Computing 10 after the fact and as such are merely band-aids over gaping wounds. The first security solution deals with locating the access points nearer to the physical center of the enterprise. Since the RF propagation limits are fixed, if the access points can be deployed such that none of the RF leaks beyond the physical limits of a physically secured building than the hacker will not be able to access the wireless networks. While this seems to be a very common sense approach, it relies on the hackers playing by the rules and only using the standard, vendor supplied equipment for wireless devices. Hackers, however, have developed more sensitive antennas. Methods for constructing these specialty antennas are well known and published on the internet. (Berghel, 2004) The most often used war-driving antenna is constructed from an empty can of Pringles potato chips and some wiring. The instruction for constructing the antenna can be found at The SSID and the association process provide another level of security for wireless networks. As stated before in the discussion of how WLANs work, the SSID is used to identify wireless devices to each other and as such provides authentication. Disabling the access point from broadcasting the SSID requires every device desiring to connect to the access point to know the correct SSID before accessing the WLAN. There are two problems with this approach. The first is that configuring SSIDs on the access point is a complicated task and most IT professionals will leave the access point configured

11 Security for Wireless Computing 11 with the default SSID that was configured at the factory. Table 1 (Liska, 2003, p.186) shows the default SSIDS from the more popular manufactures of wireless access points. Hackers simply try the default SSIDs to gain access. The second problem with using SSID as an authentication method is that the intruder can simply monitor the WLAN traffic till a new device joins the WLAN and broadcasts the supposable secret SSID for the intruder to read. Even if encryption is enabled on the WLAN the SSID is allways broadcast in the clear (un-encrypted). Table 1 Default SSIDS for More Popular Manufactures Manufacturer Cisco Compaq DLink Default SSID 2 or tsunami Compaq WLAN INTEL Intel,xlan, or 101 SMC WLAN Another method to limit access to a wireless networks is similar to a method used to control access to a wired network. All devices that are able to connect to an Ethernet networks (WLANS are a subset of Ethernet networks) have a unique Media Access Control (MAC) address that uniquely identifies each communicating device. These MAC addresses are burned-in at the factory into all devices that can connect to an Ethernet network and. MAC addresses are globally unique, no two devices can have

12 Security for Wireless Computing 12 the same MAC. These MAC(s) can be used to limit access to the corporate networks. While a MAC addresses identifies each device, a higher order address, usually TCP/IP, is required to participate on the network. The process that assigns these higher-order addresses is generally done by a Dynamic Host Configuration Protocol Server (DHCP). By limiting the DHCP server to assigning addresses to those devices that have known MAC(s), you can deny unknown devices from getting the higher order addresses needed to participate on the network. The network access points can also be configured to allow associations only from known MAC(s) Most access points manufactures allow the storage of up to 255 known good MAC(s) in to an allowable device list stored on the access point. The access point will then only allow associations from the list of known good MAC(s). This, of course, means that the access point must be reconfigured before a new user is allowed to join the WLAN. Most IT professionals will not enable this option since it creates more work for them. Every time a new wireless device is purchased, all access points must be reconfigured to accept the new MAC. (Liska, 2003) Both of the methods of filtering out intruder devices by the MACS addresses can be defeated by a wireless device that can set any arbitrary MAC in the network data packets it sends out. While the MAC(s) are burned into the NIC and cannot be changed, the process that takes the burnt-in MAC and places it into the network packet is software and software is easily modified. All an intruder device has to do is discover a good MAC and use it

13 Security for Wireless Computing 13 to gain access. This can be done by guessing or by listening in on the existing WLAN network traffic. All Ethernet network traffic carries the MACs of both the sender and the receiver in clear text. The intruder device simply steals the MAC address of an allowed device and uses that MAC to gain access. This process of subverting address is called spoofing and is used by hackers on both wired and wireless networks. (Liska, 2003) WEP can be used to encrypt data in wireless transmission but it cannot be used to encrypt MAC or higher order addresses. WEP only encrypts data between the access points and a wireless device that has associated with that particular access point. Since access points were intended to be low-cost devices, the encryption algorithm chosen for WEP is not a computational intensive double-key system but a single-key symmetric algorithm called RC4. The strength of any encryption system using keys is total number of possible keys that can be used for encryption. If the number of possible keys is small, a hacker will try all possible keys till they are able to decrypt the encrypted text. (Bishop, 2003) While RC4 does not define the key length, most implementations provide key lengths of 40 to 128 bit keys, allowing 2 40 to possible keys. While this number of possible keys should be sufficient, there are number of flaws in the RC4 algorithm that mathematically reduce this number of possible keys. (Flurher, Mantin, & Shamir, 2001) Borisov, Goldberg, and Wagner, (2001) have also documented implementation problems in the WEP protocol that limit its effectiveness. While the technical treatments of these two discovery papers are beyond

14 Security for Wireless Computing 14 most hackers to implement, that job has been made easier for hackers by downloading AirSnort ( or WebCrack ( two free WEP key cracking tools that implement the techniques describe in the two papers. The last of the exiting security mechanism discussed which is currently available for WLANs is a Remote Authentication Dial in User Service (RADUIS). RADIUS is a server that is used for centralized account authentication. Requiring access points to use RADIUS authentication means that any device wishing to create an association with the access point must supply a username and password that has been stored in the RADIUS server. While this provides stronger security than the previously discussed methodology, hackers have long known how to defeat RADIUS and password are easily guessed. Since RADIUS is simply an authentication scheme and not an encryptions device, data is still subject to electronic eavesdropping. (Liska, 2003) Before the discussion of the more robust ways of securing a WLAN, an appropriate step is to determine the current security measures the corporate world is using to secure their WLANs. Every year, an informal organization of hackers embarks on a world-wide war driving effort to find as many access points as they can, survey the security measures employed, record the data for others to use and publish the results of that effort on the Internet at A summary of 2004 world-wide war-drive results is given in Table 2. (Hurley, 2004) The reality is sobering, not even the simplest of security

15 Security for Wireless Computing 15 protocols are being used on most WLANs. The more serious problem is, despite all the recent publications about WLAN insecurity, the percentage of WLANs that are deployed with no security measures at all has increased. Table 2 Summary of June 2004 World Wide War Drive Category Total Percent Percent Change from last year Total APs Found % N/A WEP Enabled % +6.04% No WEP Enabled % -6.04% Default SSID % +3.57% Default SSID and No WEP % +2.74% New Solutions to Wireless Security The IEEE has also been looking into wireless security and has been developing a new set of security protocols for wireless computing. This new suite of tools is part of the i standards. While the new specification has yet to be ratified, some of the current work done in developing the new standard has resulted in improvements to WEP such as Temporal Key Integrity

16 Security for Wireless Computing 16 Protocol (TKIP) and an new encryption scheme, Wi-Fi Protected Access (WPA), that replaces RC4 with the more secure Advance Encryption System (AES) developed by the National Security Agency (NSA).(Farrow, 2003) While these modifications greatly enhance the security of WLANs, vendors have been slow to implement these new technologies since the technologies make their existing inventories of wireless products obsolete. Organization will be required to scrap their existing WLAN infrastructures in favor of the new products since there are minimal backwards capabilities in new i specification. (Liska, 2003) One of the more exciting technologies for enhancing WLAN security is Frequency Selective Surfaces. (Institution of Electrical Engineers, 2004) Frequency Selective Surfaces (FSS) are smart building panels that can block out chosen wavelengths of RF while allowing others to pass. This provides a new approach to providing security for wireless networks by modifying building construction to prevent the wireless radio frequency (RF) signals from propagating into unsecured physical spaces. A concern is while companies need to limit RF propagation for wireless networks they do not want to attenuate any cellular and other wireless phone signal which also operate in an adjacent band in the RF spectrum. FFS can attenuate signals in one band and not disturb signals in a nearby band. Building construction with FSS construction panels and FSS window treatments can effectively constrain the wireless networks RF signals to the desired physical spaces. It would

17 Security for Wireless Computing 17 greatly enhance security for wireless networks since any access must be from within predefined physical areas which can be made secure. This would effectively stop the war driving method of gaining access to wireless networks. FSS technology makes wireless networks the security equivalent of wired networks. (Newbold, 2004) By now you are wondering why anyone would be foolish enough to deploy a WLAN. The reasons for creating a WLAN are still valid. WLANs provide freedom and ease of use, save money on deployment and provide ubiquitous access. In fact, these are some of the same very reasons companies connected to the Internet. The answer to WLAN security is the same answer to Internet security; treat the WLAN network as a HOSTILE network just like the Internet! Industry has had solutions for connecting secure private networks to and through the Internet for years now and these same technologies can be used for WLANS. These technologies include Firewalls, Intrusion Detections Systems, Virtual Private Networks and robust public/private key encryptions system. These same systems can be used to secure a wireless network. With the right security tools, Internet and wireless computing can be made safe. Having been a network security professional for several years, my approach to deploying WLANs was the same approach I used when connecting remote users to secure networks. That approach was to use a combination of Firewall and Virtual Private Networks (VPN) technologies. Key to the use of these technologies is the assumption that the WLAN is a hostile

18 Security for Wireless Computing 18 network and that hackers can and will use this WLAN to try to penetrate and compromise the secure corporate network. Access points must be deployed on the outside of firewall. If the access point is compromised, the secure network is not. All access through the firewall must be encrypted traffic and part of a VPN tunnel of traffic that originated from a VPN enabled wireless device on the WLAN and terminates in a VPN concentrator that is sandwiched into a demilitarized zone (DMZ) bordered by two firewalls. Figure 1 shows the desired configuration. Figure 1 Securing a WLAN through VPN technology VPN Tunnels The WLAN firewall is configured to allow only properly configured VPN tunnels to pass through it. Any device that tries

19 Security for Wireless Computing 19 to connect through the WLAN to the secure network must have a properly configured VPN client. The DMZ firewall is configured the allow traffic that originates from or terminates to the VPN concentrator. The only way that a hacker can penetrate through the WLAN is to get control of a properly configured wireless device or to clone a properly configured device. While this is not impossible, it is highly improbable and most hackers will seek out softer targets. This solution adds cost to a WLAN deployment and, as such, means many organizations will not use this technique. If you must have a secure WLAN, this is certainly one way to proceed. Conclusions As with every Information technology project, security must be a primary consideration. For security to effective, it must be deployed proportional to risk. WLANs present a security risk to organizations but providing security for WLANs is not an insurmountable challenge. There are security solutions available for WLANs to mitigate those most conceivable risks. What organizations must ask is the cost of securing a WLAN worth the benefits gained from deploying the WLAN? The answer will be different for many organizations. Many will elect not to deploy WLAN. Others will deploy WLANs since benefits overcome the inherent risks and will deploy WLAN with little to no security enabled.

20 Security for Wireless Computing 20 References Arbaugh, W. A., Shankar, N., & Wan, J. Y. (2001). Your Wireless Network has No Clothes. Unpublished manuscript, University of Maryland at College Park. Retrieved October 21, 2004, from Berghel, H. (2004). Wireless Infidelity I: War Driving. Communications of the ACM, 47(9), Bishop, M. (2003). Computer Security, Art and Science. Boston: Addison Wesley. Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting Mobile Communications, The Insecurity of Seventh Annual Conference on Mobile Computing and Networking. Campbell, P., Calvert, B., & Boswell, S. (2003). Security+ Guide to Network Security Fundamentals. Boston: Thomson Course Technology. Farrow, R. (2003). Wireless Security: Send in the Clowns? Network Magazine, 18(9), Retrieved October 24, 2004, from Academic Search Premier Web Site: kie,ip,url,uid&db=aph$an= Flurher, S., Mantin, I., & Shamir, A. (2001). Weakness in the Key Scheduling Algorithm of RC4. Eighth Annual Workshop on Selected Areas in Cryptography. Retrieved October 20, 2004, from Hurley, C. (n.d.). WWWW4 Stats. Retrieved October 28, 2004, from

21 Security for Wireless Computing 21 Institution of Electrical Engineers (2004). Islands Boost Wireless Efficiency. IEE Review, 50(30), Retrieved October 27, 2004, from Academic Search Premier Web Site: kie,ip,url,uid&db=aph$an= Krouse, F. K., & Ross, K. W. (2002). Computer Networking (2nd ed.). Boston: Addison Wesley. Lewis, M. (2004). A primer on wireless networks. Family Practice Management, 11(2), Retrieved October 28, 2004, from Academic Search Premier Web Site: kie,ip,url,uid&db=aph&an= Liska, A. (2003). The Practice of Network Security, Deployment Strategies for Production Networks. Upper Saddle River, NJ: Prentice Hall. Newbold, A. (2004). Designing Buildings for the Digital Age. Computing and Control Engineering, 15(14), Retrieved September 25, 2004, from kie,ip,url,uid&db=buh$an= Panko, R. (2004). Business Data Networks and Telecommunications (5th ed.). Upper Saddle River, NJ: Prentice Hall. Pescatore, J. (2004). DIY Wireless Nets open Security Holes. IEE Review, 50(8),

22 Security for Wireless Computing 22 Siegel, J. G., Levine, M. H., & Siegel, R. M. (2004). Security safeguards over wireless networks. CPA Journal, 74(6), Retrieved October 22, 2004, from Business Source Premier Web Site: kie,ip,url,uid&db=buh$an=

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS Wireless networks are everywhere, from the home to corporate data centres. They make our lives easier by avoiding bulky cables and related problems. But with these

More information

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless Networks by By Joe Klemencic Mon. Apr http://www.cymru.com/ Securing Wireless Networks by By Joe Klemencic (faz@home.com) Mon. Apr 30 2001 Many companies make attempts to embrace new technologies, but unfortunately, many of these new technologies

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007) WPA SECURITY (Wi-Fi Protected Access) Presentation By Douglas Cheathem (csc 650.01 Spring 2007) OUTLINE Introduction Security Risk Vulnerabilities Prevention Conclusion Live Demo Q & A INTRODUCTION! WPA

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

How Secure is Wireless?

How Secure is Wireless? How Secure is Wireless? South Carolina Chapter of HIMSS Annual Conference April 24-25, 2003 Richard Gadsden Director of Computer and Network Security Medical University of South Carolina gadsden@musc.edu

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

Wireless MAXg Technology

Wireless MAXg Technology Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Wireless LAN, WLAN Security, and VPN

Wireless LAN, WLAN Security, and VPN Wireless LAN, WLAN Security, and VPN 麟瑞科技台南辦事處技術經理張晃崚 WLAN & VPN FAQ What is WLAN?802.11a?802.11b?802.11g? Which standard (product) should we use? How to deploy WLAN? How to block intruders? How to authenticate

More information

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012 NWD2705 Dual-Band Wireless N450 USB Adapter Version 1.00 Edition 1, 09/2012 Quick Start Guide User s Guide www.zyxel.com Copyright 2012 ZyXEL Communications Corporation IMPORTANT! READ CAREFULLY BEFORE

More information

Security Analysis of Common Wireless Networking Implementations

Security Analysis of Common Wireless Networking Implementations Security Analysis of Common Wireless Networking Implementations Brian Cavanagh CMPT 585 12/12/2005 The use of wireless networking to connect to the internet has grown by leaps and bounds in recent years.

More information

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03 Introduction Although a variety of wireless network technologies have or will soon reach the general business market, wireless

More information

Wireless Networking WiFi Standards 802.11a 5GHz 54MB 802.11b 2.4 GHz 11MB 802.11g 2.4GHz 52MB 802.11n 2.4/5GHz 108MB 802.11b The 802.11b standard has a maximum raw data rate of 11 Mbit/s, and uses

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

Wireless Technologies

Wireless Technologies Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless

More information

Appendix E Wireless Networking Basics

Appendix E Wireless Networking Basics Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical

More information

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

A Configuration Protocol for Embedded Devices on Secure Wireless Networks A Configuration Protocol for Embedded Devices on Secure Wireless Networks Larry Sanders lsanders@ittc.ku.edu 6 May 2003 Introduction Wi-Fi Alliance Formally Wireless Ethernet Compatibility Alliance (WECA)

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp

2013 Summer Camp: Wireless LAN Security Exercises JMU Cyber Defense Boot Camp 2013 Summer Camp: Wireless LAN Security Exercises 2013 JMU Cyber Defense Boot Camp Questions Have you used a wireless local area network before? At home? At work? Have you configured a wireless AP before?

More information

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to

More information

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013 Florin OGÎGĂU-NEAMŢIU National Defense University of Romania "Carol I"/ The Regional

More information

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder. Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/

More information

Wireless# Guide to Wireless Communications. Objectives

Wireless# Guide to Wireless Communications. Objectives Wireless# Guide to Wireless Communications Chapter 8 High-Speed WLANs and WLAN Security Objectives Describe how IEEE 802.11a networks function and how they differ from 802.11 networks Outline how 802.11g

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Configuring Wireless Security Settings on the RV130W

Configuring Wireless Security Settings on the RV130W Article ID: 5021 Configuring Wireless Security Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional

More information

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم بنام خدا تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم امنیت بخشی به سیستمهای فناوری اطالعات Securing Information Systems 1 Learning Objectives Describe the business value of security and control.

More information

Chapter 3 Wireless Configuration

Chapter 3 Wireless Configuration Chapter 3 Wireless Configuration This chapter describes how to configure the wireless features of your WNR854T router. In planning your wireless network, you should consider the level of security required.

More information

Overview of Security

Overview of Security Overview of 802.11 Security Bingdong Li Present for CPE 601 2/9/2011 Sources: 1 Jesse Walker (Intel) & 2. WinLab 1 Agenda Introduction 802.11 Basic Security Mechanisms What s Wrong? Major Risks Recommendations

More information

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov. Wireless Networks Authors: Marius Popovici Daniel Crişan Zagham Abbas Technical University of Cluj-Napoca Group 3250 Cluj-Napoca, 24 Nov. 2003 Presentation Outline Wireless Technology overview The IEEE

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs

NT1210 Introduction to Networking. Unit 6: Chapter 6, Wireless LANs NT1210 Introduction to Networking Unit 6: Chapter 6, Wireless LANs Objectives Identify the major needs and stakeholders for computer networks and network applications. Identify the classifications of networks

More information

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group

WIRELESS AS A BUSINESS ENABLER. May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group WIRELESS AS A BUSINESS ENABLER May 11, 2005 Presented by: Jim Soenksen and Ed Sale, Pivot Group Presentation Goals Describe the need for and benefits of Wireless Networking Describe the risks involved

More information

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering Excellent Voice Quality on Enterprise Wi-Fi Networks November 2010 Coverage,

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Today s challenge on Wireless Networking David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd. Agenda How Popular is Wireless Network? Threats Associated with Wireless Networking

More information

Wireless Security Algorithms

Wireless Security Algorithms (NOTE: If you are using a virtual lab to run your attacks you will need an external Wi Fi attachment. The other option is to have a direct install on your computer. Virtual labs cannot access your wireless

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ... Interworking 2006 Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks Interworking Conference, 15th - 17th of January 2007 Dr-Ing Kai-Oliver Detken Business URL: http://wwwdecoitde

More information

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved Wireless Networking Chapter 23 Overview In this chapter, you will learn how to Discuss wireless networking components Analyze and explain wireless networking standards Install and configure wireless networks

More information

5. Execute the attack and obtain unauthorized access to the system.

5. Execute the attack and obtain unauthorized access to the system. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and

More information

Improving Security in Wireless Networks

Improving Security in Wireless Networks Improving Security in Wireless Networks Introduction Wireless networking provides many advantages over conventional wired networks. For instance the ability to connect to your network resources without

More information

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design

Wireless Security Protocol Analysis and Design. Artoré & Bizollon : Wireless Security Protocol Analysis and Design Protocol Analysis and Design 1 Networks 1. WIRELESS NETWORKS 2 Networks 1. WIRELESS NETWORKS 1.1 WiFi 802.11 3 Networks OSI Structure 4 Networks Infrastructure Networks BSS : Basic Set Service ESS : Extended

More information

Wireless g AP. User s Manual

Wireless g AP. User s Manual Wireless 802.11g AP User s Manual Version 1.8 User s Guide 0 Copyright Statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means,

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Tuesday, May :00 AM - 5:00 PM

Tuesday, May :00 AM - 5:00 PM Tuesday, May 15 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day One of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

802.11b+g Wireless LAN USB Adapter. User Manual

802.11b+g Wireless LAN USB Adapter. User Manual 802.11b+g Wireless LAN USB Adapter User Manual REGULATORY STATEMENTS FCC Certification The United States Federal Communication Commission (FCC) and the Canadian Department of Communications have established

More information

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc.

GHz g. Wireless A+G. User Guide. Notebook Adapter. Dual-Band. Dual-Band WPC55AG a. A Division of Cisco Systems, Inc. A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Notebook Adapter User Guide Model No. WPC55AG Copyright and Trademarks Specifications are subject

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. Access Point WIRELESS WAP54G (EU/LA/UK) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G Access Point User Guide Model No. WAP54G (EU/LA/UK) Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter. User Guide WIRELESS WUSB54G. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter User Guide Model No. WUSB54G Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Procedure: You can find the problem sheet on the Desktop of the lab PCs. University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Advance Networks Laboratory 907529 Lab.3 WLAN Security Objectives 1. Configure administrator accounts.

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No.

Wireless-N. User Guide. USB Network Adapter WUSB300N WIRELESS. Model No. 2.4 GHz WIRELESS Wireless-N USB Network Adapter User Guide Model No. WUSB300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark

More information

Managing Rogue Devices

Managing Rogue Devices Information About Rogue Devices, page 1 Configuring Rogue Detection (GUI), page 5 Configuring Rogue Detection (CLI), page 8 Information About Rogue Devices Rogue access points can disrupt wireless LAN

More information

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with SRX 400. User Guide WIRELESS WMP54GX4. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G PCI Adapter with SRX 400 User Guide Model No. WMP54GX4 Copyright and Trademarks Specifications are subject to change without notice.

More information

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network Introduction to Wireless Local Area Network white paper Introduction A wireless local area network (WLAN) is a flexible data communications system that can use either infrared or radio frequency (RF) technology

More information

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC WLAN Security Dr. Siwaruk Siwamogsatham ThaiCERT, NECTEC Agenda Wireless Technology Overview IEEE 802.11 WLAN Technology WLAN Security Issues How to secure WLAN? WLAN Security Technologies Wireless Technologies

More information

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No.

A Division of Cisco Systems, Inc. GHz 2, g. Wireless-G. User Guide. PCI Adapter WIRELESS. with SpeedBooster WMP54GS (EU/UK/LA) Model No. A Division of Cisco Systems, Inc. GHz 2,4 802.11g WIRELESS Wireless-G PCI Adapter with SpeedBooster User Guide Model No. WMP54GS (EU/UK/LA) Copyright and Trademarks Specifications are subject to change

More information

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation

Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Industrial Automation Flirts with Wireless The automation industry increasingly finds wireless attractive, and for several reasons.

More information

FAQ on Cisco Aironet Wireless Security

FAQ on Cisco Aironet Wireless Security FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most

More information

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus.

This regulation outlines the policy and procedures for the implementation of wireless networking for the University Campus. UAR NUMBER: 400.01 TITLE: Wireless Network Policy and Procedure INITIAL ADOPTION: 11/6/2003 REVISION DATES: PURPOSE: Set forth the policy for using wireless data technologies and assigns responsibilities

More information

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002

Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Wireless Network Policy and Procedures Version 1.5 Dated November 27, 2002 Pace University reserves the right to amend or otherwise revise this document as may be necessary to reflect future changes made

More information

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications

Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Learn How to Configure EnGenius Wi-Fi Products for Popular Applications Operation Modes Access Point (AP) / WDS AP Client Bridge (CB) Repeater WDS Bridge Client Router AP Router Access Point An access

More information

BreezeACCESS VL Security

BreezeACCESS VL Security BreezeACCESS VL Security Technical Paper Alvarion Ltd. All rights reserved. The material contained herein is proprietary. No part of this publication may be reproduced in any form without the express written

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

Configuring OfficeExtend Access Points

Configuring OfficeExtend Access Points Information About OfficeExtend Access Points, page 1 OEAP 600 Series Access Points, page 2 OEAP in Local Mode, page 3 Supported WLAN Settings for 600 Series OfficeExtend Access Point, page 3 WLAN Security

More information

INSIDE. Securing Enterprise Wireless Networks. Symantec Enterprise Security

INSIDE. Securing Enterprise Wireless Networks. Symantec Enterprise Security Symantec Enterprise Security WHITE PAPER Securing Enterprise Wireless Networks INSIDE Wireless LAN technology Benefits and risks of wireless Wireless LAN security considerations Wireless security features

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

Wireless-N Business Notebook Adapter

Wireless-N Business Notebook Adapter Wireless-N Business Notebook Adapter USER GUIDE BUSINESS SERIES Model No. WPC4400N Model Model No. No. Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Chapter 7. Basic Wireless Concepts and Configuration. Part I

Chapter 7. Basic Wireless Concepts and Configuration. Part I Chapter 7 Basic Wireless Concepts and Configuration Part I CCNA3-1 Chapter 7-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Family Structural Overview

Family Structural Overview Some IEEE 802 Standards TELE301 Lecture 5 802.11 Wireless Networking David Eyers Telecommunications Programme University of Otago 802.1 Bridging and Management 802.1X,... 802.3 Ethernet 802.11 Wireless

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information

The Security Mechanism for IEEE Wireless Networks

The Security Mechanism for IEEE Wireless Networks Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. The

More information

Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions

Agenda. Housekeeping. Library Computing Without Wires Tuesday, March 1, :00 noon to 1:00 p.m. Don t wait for Q&A to submit questions Infopeople Webcast: Technology Tuesday Series Library Computing Without Wires Tuesday, March 1, 2005 12:00 noon to 1:00 p.m Thomas Edelblute Public Access Systems Coordinator Anaheim Public Library TEdelblute@anaheim.net

More information

1. INTRODUCTION. Wi-Fi 1

1. INTRODUCTION. Wi-Fi 1 Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi

More information

A Division of Cisco Systems, Inc. Dual-Band. GHz g a. Dual-Band. Wireless A+G. Access Point. User Guide WIRELESS WAP55AG. Model No.

A Division of Cisco Systems, Inc. Dual-Band. GHz g a. Dual-Band. Wireless A+G. Access Point. User Guide WIRELESS WAP55AG. Model No. A Division of Cisco Systems, Inc. Dual-Band 5 GHz 802.11a + GHz 2.4 802.11g WIRELESS Dual-Band Wireless A+G Access Point User Guide Model No. WAP55AG Copyright and Trademarks Specifications are subject

More information

Security in IEEE Networks

Security in IEEE Networks Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set

More information

Information Security in Corporation

Information Security in Corporation Information Security in Corporation System Vulnerability and Abuse Software Vulnerability Commercial software contains flaws that create security vulnerabilities. Hidden bugs (program code defects) Zero

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP

More information

Certified Wireless Network Administrator

Certified Wireless Network Administrator coursemonster.com/uk Certified Wireless Network Administrator Overview This new market-leading course from us delivers the best in Wireless LAN training, combining the benefits of: Certified Wireless Network

More information

D-Link AirPlus G DI-524

D-Link AirPlus G DI-524 D-Link AirPlus G DI-524 802.11g/ 2.4 GHz Wireless Router TM Manual Building Networks for People Contents Package Contents... 3 Introduction... 4 Wireless Basics... 8 Getting Started...11 Using the Configuration

More information

Dolphin-M. User s Manual

Dolphin-M. User s Manual IEEE 802.11g 54Mbps Wireless Bridge Dolphin-M User s Manual V1.0.0 Copyright There is no any clear or implicit assurance in the user's manual of our company, including the assurance of selling or installing

More information

Digital Entertainment. Networking Made Easy

Digital Entertainment. Networking Made Easy Digital Entertainment 2003 by TiVo Inc. Reproduction in whole or in part without written permission is prohibited. All rights reserved. Printed in the USA. TiVo, TiVo Central, and TiVolution are registered

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information