WLAN Security Overview
|
|
- Claribel Jordan
- 5 years ago
- Views:
Transcription
1 WLAN Security Overview
2 This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless security. Learn about wireless security standards and certifications.
3 Contents Standards organizations International Organization for Standardization (ISO) Institute of Electrical and Electronics Engineers (IEEE) Internet Engineering Task Force (IETF) Wi - Fi Alliance networking basics security basics Data Privacy Authentication, authorization, accounting (AAA) Segmentation Monitoring Policy security history i security amendment and WPA certifications RSN The future of security
4 Introduction The standard defines wireless local area network (WLAN) technology. Wi Fi communications - concern about the: ability to transmit data securely over a wireless medium and properly protect wired network resources. This concern is as valid now as it was in 1997 when was introduced.
5 Standards Organizations The International Organization for Standardization (ISO) Open Systems Interconnection (OSI) model = architectural model for data communications. The Institute of Electrical and Electronics Engineers (IEEE) Creating standards for compatibility and coexistence between networking equipment inc. wireless equipment The Internet Engineering Task Force (IETF) Creating Internet standards -> wireless networking, security protocols etc. The Wi-Fi Alliance Performs certification testing wireless networking equipment conforms to the WLAN communication guidelines, similar to the IEEE standard.
6 International Organization for Standardization (ISO) a global + non governmental organization identifies business, government, and society needs develops standards in partnership with the sectors that will put them to use. creation of the Open Systems Interconnection (OSI) model - standard reference for data communications between computers since the late 1970s. Website
7 International Organization for Standardization (ISO) The layers of the OSI model are as follows: Layer 7, Application Layer 6, Presentation Layer 5, Session Layer 4, Transport Layer 3, Network Layer 2, Data - Link LLC sublayer MAC sublayer Layer 1, Physical The IEEE standard defines communication mechanisms only at the Physical layer and MAC sublayer of D-L.
8 Institute of Electrical and Electronics Engineers (IEEE) a global professional society > 350,000 members. mission - to foster technological innovation and excellence for the benefit of humanity. IEEE is probably best known for its LAN standards, the IEEE 802 project. IEEE projects are subdivided into working groups to develop standards that address specific problems or needs. the IEEE working group - creation of a standard for Ethernet, the IEEE working group - creating the WLAN standard. the 11 = 11th working group Website
9 Institute of Electrical and Electronics Engineers (IEEE) IEEE , more commonly referred to as Wi Fi. standard for providing LAN communications using radio frequencies (RF) standard = the most current guideline to provide operational parameters for WLANs. Working groups -> task groups are formed. These task groups are assigned a sequential single letter that is added to the end of the standard number Eg g, i, and 802.3af
10 Internet Engineering Task Force (IETF) international community of people in the networking industry goal is to make the Internet work better. no membership fees, and anyone may register for and attend an IETF meeting. one of five main groups that are part of the Internet Society (ISOC). IAB, ICANN, IESG, IRTF, and IETF. The IETF is broken into eight subject matter areas: Applications, General, Internet, Operations and Management, Real - Time Applications and Infrastructure, Routing, Security, and Transport. Website
11 Internet Engineering Task Force (IETF) The results of a working group = Request for Comments (RFC). RFCs describe network protocols, services, or policies may evolve into an Internet standard. numbered sequentially, and never reused. updated or supplemented by higher numbered RFCs. Eg. Mobile IPv4 is described in RFC 3344 and updated in RFC When RFC 3344 was created, it made RFC 3220 obsolete. At the top of the RFC document, it states whether it is updated by another RFC and also if it makes any other RFCs obsolete.
12 Wi - Fi Alliance Originally named the Wireless Ethernet Compatibility Alliance (WECA), Founded in August Renamed Wi-Fi Alliance in October is a global, nonprofit industry association promoting the growth of WLANs. primary tasks - to market the Wi-Fi brand + raise consumer awareness of new technologies. 450 m users immediately recognize the Wi-Fi logo. website
13 Wi - Fi Alliance main task - ensure the interoperability of WLAN products - certification testing. Products pass the Wi - Fi certification process receive a Wi - Fi Interoperability Certificate (next slide) provides detailed information about the individual product s Wi-Fi certifications This certification includes radio interoperability such as a and b + additional capabilities -> security, multimedia, convergence, and supported special features.
14 Wi - Fi Alliance iphone 4s
15 Networking Basics Wireless bridge links - provide connectivity between buildings in the same way that county or state roads provide distribution of traffic between neighbourhoods. The purpose of wireless bridging is to connect two separate, wired networks wirelessly. An bridge link is an example of wireless technology being implemented at the distribution layer.
16 Security Basics Securing a wireless network, five major components are typically required: Data privacy Authentication, authorization, and accounting (AAA) Segmentation Monitoring Policy
17 Security Basics Because data is transmitted freely and openly in the air, proper protection is needed to ensure data privacy, -> so strong encryption is needed. Wireless portal must be protected, -> authentication solution is needed to ensure that only authorized users can pass through the portal via a wireless access point. After users have been authorized to pass through the wireless portal, VLANs and identity - based mechanisms are needed to further restrict access to network resources (Segmentation) wireless networks can be further protected with continuous monitoring by a wireless intrusion detection system (Monitoring). All of these security components should also be cemented with policy enforcement.
18 Data Privacy wireless - > all data transmissions travel in the open air. Data privacy in a wired network -> easier because physical access to the wired medium is more restricted. Wireless transmissions is available to anyone in listening range. cipher encryption technologies - > obscure information - > proper data privacy in wireless networks. A cipher is an algorithm used to perform encryption.
19
20 Data Privacy Encrypt and decrypt information forms the science known as cryptology The term cryptology - > Greek language and translates to mean hidden word. The goal - > take a piece of information, often referred to as plaintext, and, using a process or algorithm, also referred to as a key or cipher, to transform the plaintext into encrypted text, also known as ciphertext.
21 Data Privacy Steganography - Greek language and is translated as concealed writing. steganography strives to hide the fact that there is a message. Steganography vs Cryptography This is often referred to as security through obscurity or hiding a message in plain sight. A classic example - write a document with the first letter of each sentence or word as the hidden message Case- speaks in different language?
22 Data Privacy Steganography -> digital watermarking embeds an artist or photographer s information in an image so that ownership can be proven in case someone tries to use the image without permission. Case : microsoft word
23 Authentication, Authorization, Accounting (AAA) Authentication is the verification of user identity and credentials. Users must identify themselves and present credentials, - usernames and passwords or digital certificates. More secure authentication systems use multifactor authentication, which requires at least two sets of different credentials to be presented. Authorization involves granting access to network resources and services. Before authorization - authentication must occur. Accounting is tracking the use of network resources by users. It is an important aspect of network security that is used to keep a paper trail of who used which resource and when. A record is kept of user identity, which resource was accessed, and at what time.
24 Segmentation Although it is of the utmost importance to secure an enterprise wireless network by utilizing both strong encryption and an AAA solution, an equally important aspect of wireless security is segmentation. Important to separate users into proper groups. Once authorized onto network resources, users can be further restricted as to what resources they may access and where they can go. Segmentation can be achieved through a variety of means, including firewalls, routers, VPNs, and VLANs. The most common wireless segmentation strategy used in enterprise WLANs is Layer 3 segmentation using VLANs.
25 Monitoring After designed and installed -> important to monitor it. make sure that it is performing up to your expectations and those of your users, it is necessary to monitor it for attacks and intrusions constantly. Like cctv = important for the wireless network administrator to monitor the wireless traffic of a secured network. install a wireless intrusion detection system (WIDS). + wireless intrusion prevention system (WIPS). Both have the ability to classify valid and invalid devices on the network.
26 Policy Securing a wireless network and monitoring for threats are absolute necessities, but both are worthless unless proper security policies are in place. What good is an 802.1X/EAP solution if the end users share their passwords? Why purchase an intrusion detection system if a policy has not been established for dealing with rogue access points? WLAN security policies must be clearly defined and enforced to solidify the effectiveness of all WLAN security components. In most countries, mandated regulations exist for protecting and securing data communications within all government agencies. - USIM In the United States, the National Institute of Standards and Technology (NIST) maintains the Federal Information Processing Standards (FIPS). Of special interest to wireless security is the FIPS standard, which defines security requirements for cryptography modules. Additionally, protecting information and communications in certain industries such as healthcare and banking.
27 Summary This chapter explained the roles and responsibilities of four key organizations involved with wireless security and networking: ISO, IEEE, IETF & Wi - Fi Alliance provide a basic understanding of the relationship between networking fundamentals and technologies: OSI model, Core, distribution, and access provide a basic knowledge of data privacy, some of the basic components of security: Cryptology, Cryptography, Cryptanalysis, Steganography, Plaintext, Key, Cipher, Ciphertext Discussed five major components that are typically required to secure an : Data privacy, Authentication, authorization, and accounting (AAA), Segmentation, Monitoring, Policy The security history
COPYRIGHTED MATERIAL. Contents
Contents Foreword Introduction xxv xxvii Assessment Test xxxviii Chapter 1 WLAN Security Overview 1 Standards Organizations 3 International Organization for Standardization (ISO) 3 Institute of Electrical
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationChapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide
Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing
More informationExam : PW Title : Certified wireless security professional(cwsp) Version : DEMO
Exam : PW0-200 Title : Certified wireless security professional(cwsp) Version : DEMO 1. Given: John Smith often telecommutes from a coffee shop near his home. The coffee shop has an 802.11g access point
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationCWTS Exam Objectives (Exam PW0-070)
Introduction The Certified Wireless Technology Specialist (CWTS) certification, covering the current objectives, will certify that successful candidates know the fundamentals of RF behavior, can explain
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : PW0-200 Title : Certified wireless security professional(cwsp) Vendors : CWNP Version : DEMO Get Latest & Valid PW0-200
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationChapter 5 Local Area Networks. Computer Concepts 2013
Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section
More informationWireless technology Principles of Security
Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the
More informationWireless Technologies
Wireless Technologies Networking for Home and Small Businesses Chapter 7 Manju. V. Sankar 1 Objectives Describe wireless technologies. Describe the various components and structure of a WLAN Describe wireless
More informationOutline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.
Outline 18-759: Wireless Networks Lecture 10: 802.11 Management Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Spring Semester 2016 http://www.cs.cmu.edu/~prs/wirelesss16/
More informationChapter 2 Networking Standards and the OSI Model
Network+ Guide to Networks, 6 th Edition 2-1 Chapter 2 Networking Standards and the OSI Model At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationWireless LAN Security. Gabriel Clothier
Wireless LAN Security Gabriel Clothier Timeline 1997: 802.11 standard released 1999: 802.11b released, WEP proposed [1] 2003: WiFi alliance certifies for WPA 2004: 802.11i released 2005: 802.11w task group
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationRequirements for Building Effective Government WLANs
White Paper Government Requirements for Building Effective Government WLANs CJ Mathias Farpoint Group Introduction With governments just now beginning the adoption of wireless LANs as a key component of
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationCyber Security Guidelines for Public Wi-Fi Networks
Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description
More informationWireless LAN Overview
A wireless LAN (WLAN) is, in some sense, nothing but a radio with different frequencies and characteristics acting as a medium for networks. The Cisco 800, 1800, 2800, and 3800 series integrated services
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationSamsung Security AP WHITE PAPER
WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationChapter 3: Network Protocols and Communications
Chapter 3: Network Protocols and Communications Introduction to Networks Intro to Networks v5 Message Delivery Options IPv4 Unicast One-to-One Multicast One-to-Many Broadcast One-to-All IPv6 Unicast One-to-One
More informationPROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL
Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.
More informationWireless MAXg Technology
Wireless MAXg Technology MAXimizing range, performance, security and simplicity for 802.11g networks Technology Note Wireless technology has undoubtedly become a ubiquitous presence in our computing environment,
More informationIEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT
IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT Hüseyin ÇOTUK Information Technologies hcotuk@etu.edu.tr Ahmet ÖMERCİOĞLU Information Technologies omercioglu@etu.edu.tr Nurettin ERGİNÖZ Master Student
More informationComplying with RBI Guidelines for Wi-Fi Vulnerabilities
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines
More informationCyber Security Guidelines for Securing Home and Small Office Routers
Cyber Security Guidelines for Securing Home and Small Office Routers Author: CS Risk Management Section Document Published Date: March 2018 Document History: Version Description Date 1.0 Published V1.0
More informationCERTIFIED WIRELESS NETWORK PROFESSSIONAL CWNP Certified Wireless Network Administrator (CWNA)
Our Learning Exclusive Custom exam prep software and materials Exam delivery in classroom with 98% success Course specific thinqtank Learning publications to promote fun exciting learning Extended hours
More informationWireless Network Security
Wireless Network Security Wireless LAN Security Slide from 2 nd book 1 802.11 Wireless LAN Security Stations in LAN are connected physically while in WLAN any station in the radio range is connected, so
More informationFAQ on Cisco Aironet Wireless Security
FAQ on Cisco Aironet Wireless Security Document ID: 68583 Contents Introduction General FAQ Troubleshooting and Design FAQ Related Information Introduction This document provides information on the most
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED
Part V ECHONET Lite System Design Guidelines i 2011 (2012) ALL RIGHTS RESERVED The specifications published by the ECHONET Consortium are established without regard to industrial property rights (e.g.,
More informationConfiguring a VAP on the WAP351, WAP131, and WAP371
Article ID: 5072 Configuring a VAP on the WAP351, WAP131, and WAP371 Objective Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast domains that are the wireless equivalent of
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationAppendix E Wireless Networking Basics
Appendix E Wireless Networking Basics This chapter provides an overview of Wireless networking. Wireless Networking Overview The FWG114P v2 Wireless Firewall/Print Server conforms to the Institute of Electrical
More informationLayered Architecture
1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet
More informationSecurity in IEEE Networks
Security in IEEE 802.11 Networks Mário Nunes, Rui Silva, António Grilo March 2013 Sumário 1 Introduction to the Security Services 2 Basic security mechanisms in IEEE 802.11 2.1 Hidden SSID (Service Set
More informationAdd a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)
Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP) Objective A Wireless Access Point (WAP) is a networking device that allows wireless-capable devices to connect to
More informationCurriculum Catalog
2017-2018 Curriculum Catalog Career and Technical Education Series: Information Technology Introduction to Network Systems 2017 Glynlyon, Inc. Table of Contents INTRODUCTION TO NETWORK SYSTEMS COURSE OVERVIEW...
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationAuthentication and Security: IEEE 802.1x and protocols EAP based
Authentication and Security: IEEE 802.1x and protocols EAP based Pietro Nicoletti Piero[at]studioreti.it 802-1-X-EAP-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright
More informationCsci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.
WEP Weakness Csci388 Wireless and Mobile Security Access Control:, EAP, and Xiuzhen Cheng cheng@gwu.edu 1. IV is too short and not protected from reuse 2. The per packet key is constructed from the IV,
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationCertified Wireless Network Administrator
coursemonster.com/uk Certified Wireless Network Administrator Overview This new market-leading course from us delivers the best in Wireless LAN training, combining the benefits of: Certified Wireless Network
More informationMobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE
Mobile MOUSe WIRELESS TECHNOLOGY SPECIALIST ONLINE COURSE OUTLINE COURSE TITLE WIRELESS TECHNOLOGY SPECIALIST COURSE DURATION 13 Hours of Interactive Training COURSE OVERVIEW This course will teach you
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More informationXerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers
Xerox FreeFlow Print Server Security White Paper Secure solutions for you and your customers Executive Summary Why is security more important than ever? New government regulations have been implemented
More informationUnderstanding Networking Fundamentals
Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation
More informationWi-Fi Scanner. Glossary. LizardSystems
Wi-Fi Scanner Glossary LizardSystems 2 Table of Contents 802 6 802.11 6 802.11a 6 802.11b 6 802.11d 6 802.11e 6 802.11g 6 802.11h 6 802.11i 6 802.11j 6 802.11n 7 802.1X 7 802.3 7 A 8 Ad-Hoc mode 8 AES
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationChapter 17. Wireless Network Security
Chapter 17 Wireless Network Security IEEE 802.11 IEEE 802 committee for LAN standards IEEE 802.11 formed in 1990 s, to develop a protocol & transmission specifications for wireless LANs (WLANs) Demand
More informationObjectives. Upon completion you will be able to: Understand how the Internet came into being
Chapter 1 Objectives Upon completion you will be able to: Understand how the Internet came into being Understand the meaning of the terms protocol and standard Understand the various organizations involved
More informationWireless LAN Solutions
Wireless LAN Solutions Juniper Networks delivers wireless solutions for enterprises of all sizes and types from small retail installations to the largest campuses Your JUNIPER NETWORKS dedicated Sales
More informationCSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology
CSNT 180 Wireless Networking Chapter 7 WLAN Terminology and Technology Norman McEntire norman.mcentire@servin.com Founder, Servin Corporation, http://servin.com Technology Training for Technology Professionals
More informationChapter 3: Network Protocols and Communications. Introduction to Networks v5.1
Chapter 3: Network Protocols and Communications Introduction to Networks v5.1 3.0 Introduction 3.1 Rules of Communication 3.2 Network Protocols and Standards 3.3 Data Transfer in the Network 3.4 Summary
More informationITU Forum Bridging the ICT standardization & development gap. The Internet Engineering Task Force (IETF) and Internet Standardisation
ITU Forum Bridging the ICT standardization & development gap The Internet Engineering Task Force (IETF) and Internet Standardisation Dawit Bekele Manager, African Regional Bureau Internet Society IETF
More informationChapter 1 Describing Regulatory Compliance
[ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know
More informationCisco Wireless LAN Controller Module
Cisco Wireless LAN Controller Modules Simple and secure wireless deployment and management for small and medium-sized businesses (SMBs) and enterprise branch offices Product Overview Cisco Wireless LAN
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More informationCisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps
Cisco 300-375 Dumps with Valid 300-375 Exam Questions PDF [2018] The Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) exam is an ultimate source for professionals to retain their credentials
More informationSolution Architecture
2 CHAPTER Introduction The purpose of the Secure Wireless is to provide common security services across the network for wireless and wired users and enable collaboration between wireless and network security
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationUnit A - Connecting to the Network
Unit A - Connecting to the Network 1 What is a network? The ability to connect people and equipment no matter where they are in the world. telephone computers television How does your body work as a network?
More information802.1X: Port-Based Authentication Standard for Network Access Control (NAC)
White Paper 802.1X: Port-Based Authentication Standard for Network Access Control (NAC) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net
More informationD. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
Volume: 119 Questions Question No: 1 John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website.
More informationComputer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan
Computer Network : Lecture Notes Nepal Engineering College Compiled by: Junior Professor: Daya Ram Budhathoki Nepal Engineering college, Changunarayan Chapter3: OSI Reference Model: Network Software: Network
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationChapter 2 Communicating Over the Network
Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationInternetworking. from the Webopedia Computer Dictionary
Internetworking The art and science of connecting individual local-area networks (LANs) to create wide-area networks (WANs), and connecting WANs to form even larger WANs. Internetworking can be extremely
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationQuickSpecs. HPE OfficeConnect M n Access Point Series. Overview. HPE OfficeConnect M n Access Point Series
Overview Models HPE OfficeConnect M220 802.11n (AM) Access Point HPE OfficeConnect M220 802.11n (WW) Access Point J9798A J9799A Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4
More informationSoftLayer Security and Compliance:
SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers
More informationWireless AC1200 Concurrent Dual Band PoE Access Point
DAP-2660 Version 1.00 AirPremier Wireless AC1200 Concurrent Dual Band PoE Access Point Product Overview...5 Introduction... 5 Features... 6 Package Contents... 7 System Requirements... 7 Hardware Overview...8
More informationChapter 1 Introduction
Sungkyunkwan University Chapter 1 Introduction Prepared by C. Rajesh and H. Choo 2017-Fall Computer Networks Copyright 2000-2014 2000-2017 Networking Laboratory 1/52 Chapter 1 Outline 1.1 Overview of the
More informationCisco Unified Wireless Network Solution Overview
1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers
More information1. INTRODUCTION. Wi-Fi 1
Wi-Fi 1 1. INTRODUCTION Wi-Fi, or Wireless Fidelity, is freedom: it allows you to connect to the Internet from your home, a bed in a hotel room or at a conference room at work without wires. How? Wi-Fi
More information802.1x. ACSAC 2002 Las Vegas
802.1x ACSAC 2002 Las Vegas Jeff.Hayes@alcatel.com 802.1 Projects The IEEE 802.1 Working Group is chartered to concern itself with and develop standards and recommended practices in the following areas:
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationA HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage
A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,
More informationCisco How Virtual Private Networks Work
Table of Contents How Virtual Private Networks Work...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Background Information...1 What Makes a VPN?...2 Analogy:
More informationCS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis
CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE
More informationOvercoming Concerns about Wireless PACs and I/O in Industrial Automation
Overcoming Concerns about Wireless PACs and I/O in Industrial Automation Industrial Automation Flirts with Wireless The automation industry increasingly finds wireless attractive, and for several reasons.
More informationCourse Outline. CWTS Certified Wireless Technology Specialist. CWTS Certified Wireless Technology Specialist
Course Outline CWTS 2013 - Certified Wireless Technology Specialist 22 Jan 2019 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationSecuring Cisco Wireless Enterprise Networks ( )
Securing Cisco Wireless Enterprise Networks (300-375) Exam Description: The 300-375 Securing Wireless Enterprise Networks (WISECURE) exam is a 90minute, 60-70 question assessment that is associated with
More informationIntegrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise
System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support
More informationSecurity Enhancements
OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows
More informationPA-DSS Implementation Guide for Sage MAS 90 and 200 ERP. and Sage MAS 90 and 200 Extended Enterprise Suite
for Sage MAS 90 and 200 ERP Versions 4.30.0.18 and 4.40.0.1 and Sage MAS 90 and 200 Extended Enterprise Suite Versions 1.3 with Sage MAS 90 and 200 ERP 4.30.0.18 and 1.4 with Sage MAS 90 and 200 ERP 4.40.0.1
More information