Chancen und Risiken im Bereich von WLAN's. FGSec - Vorabendveranstaltung 20. Juni 2002 Uwe B. Kissmann

Similar documents
Wireless e-business Security. Lothar Vigelandzoon

Wireless Attacks and Countermeasures

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

1100 Dexter Avenue N Seattle, WA NetMotion Mobility Architecture A Look Under the Hood

COPYRIGHTED MATERIAL. Index

Wireless LAN Security (RM12/2002)

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Wireless (Select Models Only) User Guide

Karthik Pinnamaneni COEN 150 Wireless Network Security Dr. Joan Holliday 5/21/03

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Naveen Kumar. 1 Wi-Fi Technology

Wireless (Select Models Only) User Guide

CND Exam Blueprint v2.0

In-Building Wireless Networks. Mitchell Shnier Lance Communications

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Wireless LAN Solutions

Security+ SY0-501 Study Guide Table of Contents

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

The following chart provides the breakdown of exam as to the weight of each section of the exam.

What is Eavedropping?

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Securing Wireless LANs with Certificate Services

Chapter 5 Local Area Networks. Computer Concepts 2013

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

Standard For IIUM Wireless Networking

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

G o i n g W i r e l e s s

System Threat Analysis Case Study for Software Based Communications

It is the process of sharing data, programs, and information between two or more computers.

Wireless technology Principles of Security

Children s Health System. Remote User Policy

Wireless# Guide to Wireless Communications. Objectives

Wireless LAN, WLAN Security, and VPN

A Glossary of Terms. 9 July 2004, Rev. B

Custom Connect. All Area Networks. customer s guide to how it works version 1.0

Cisco Adaptive Wireless Intrusion Prevention System: Protecting Information in Motion

Technology in Action

Wednesday, May 16, 2018

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

An introduction to wireless security at home, on the road and on campus. Sherry Callahan and Kyle Crane

Wireless Network Security Fundamentals and Technologies

SonicWALL TZ 170 Series Prepared by SonicWALL, Inc. 7/6/2004

Education Network Security

Wireless Embedded Modules

Chapter 1 Describing Regulatory Compliance

Alcatel-Lucent Wireless Solution COPYRIGHT 2011 ALCATEL-LUCENT ENTERPRISE. ALL RIGHTS RESERVED.

X-Kryptor Secures all Networks

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

The Need for Confluence

Chapter 10: Wireless LAN & VLANs

Digital Entertainment. Networking Made Easy

Appendix E Wireless Networking Basics

Concepts, Technology, and Applications of Mobile Commerce

align security instill confidence

Everybody s connecting.

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Orientation and Guidance within Doors

Cyber Attacks & Breaches It s not if, it s When

LESSON 12: WI FI NETWORKS SECURITY

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Chapter 24 Wireless Network Security

Seamless Yet Secure -Hotspot Roaming


The power of Wing. simplified

Wireless Network Introduction

Designing And Deploying Wireless Networks: A Practical Guide To Implementing n And ac Wireless Networks For Enterprise-Based

Ferenc Peták. Department of Medical Physics and Informatics 2018

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Wireless Technologies

MR Cloud Managed Wireless Access Points

CSC Introduction to Computers and Their Applications

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

Celestix Networks, Inc. 702 Brown Road. Fremont, California Ph Fx Introduction to Wireless Local Area Network

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

CompTIA Mobility+ Certification

Wireless Security. Training materials for wireless trainers

Cloud-Enable Your District s Network For Digital Learning

ECDL / ICDL IT Security. Syllabus Version 2.0

Information System Security. Nguyen Ho Minh Duc, M.Sc

Wi-Fi - Why for? A Word About Spectrum. I T I n f r a s t r u c t u r e S o l u t i o n s

Requirements for Building Effective Government WLANs

E-companion. Quiz for IT-knowledge

Achieving End-to-End Security in the Internet of Things (IoT)

How Insecure is Wireless LAN?

CSNT 180 Wireless Networking. Chapter 8 Planning a WLAN Site Survey

SECURE USE OF IT Syllabus Version 2.0

Ready Theatre Systems RTS POS

Transcription:

Chancen und Risiken im Bereich von WLAN's FGSec - Vorabendveranstaltung 20. Juni 2002 Uwe B. Kissmann Leader IT- Security Services. IBM Global Services Switzerland UKIS@CH.IBM.COM

Currently, we are working with customers to secure their wireless LANs. They look as follows: Person Space (office, briefcase, person) PAN On-campus (Office, School, Airport, Hotel) Nomenclature Wireless LAN 802.11 (10 s-100 s of meters) Off-campus (Anywhere) Wireless WAN 2G (GSM), 2.5G(GPRS, CDMA) 3G (CDMA2000W-CDMA, UMTS) (kilometers) Geography Technology

Wireless LANs (WLAN IEEE802.11b) the facts A Wireless Local Area Network (WLAN) is a flexible wireless data communications system implemented as an extension to, or as an alternative for, a wired LAN The most widely adopted standard for wireless networking is IEEE 802.11b This provides a theoretical transfer rate of 11Mbps. Actual transfer rates are 6Mbps and lower when security and encryption are enabled. Higher rates (up to 56Mbps) are planned Range varies from 400-1500 feet (up to 300m). Range can be extended by using multiple access points (roaming possible) WLAN technologies: Allow the enterprise to extend network coverage to allow for in-building or campus communication for mobile users Can help solve access in hard-to-reach areas improving workforce mobility (i.e. Warehousing, Point-of-sale handheld equipment) and Allows organizations to extend their wired networks without laying expensive cable

Existing "wired" security controls will be pushed to their limits and become increasingly important Wireless Channels Intranet Policy management Intrusion detection Hardened platforms Security verification Secure device management Incident management Firewalls Content/E-mail filtering Anti-virus Identification & authentication Authorisation Security organisation

A new sport? Drive-By-Hacking, War-Driving,...

Wireless LANs: Security Issues License free radio frequency technology data easily sniffed by eavesdroppers RF signal leakage through buildings no need to break into the office to gain LAN connectivity tools available to detect vulnerable wlans ( drive-by hacking ) Susceptible to radio interference can be adversely affected by microwave ovens, bluetooth or malicious denial of service signal jamming attacks Lack of standards Only agreed standard (WECA Wi-Fi for 802.11b) is 40bit WEP Very Weak!

Wireless LANs: Security Issues Security Issue 1: the Management Issue most installations "out of the box" -- it's that easy... protection options not in use / not enforced...it's sad but it's so true... Security Issue 2: the Technology Issue Choice of encryption technology WEP- break in within hours in public WLAN sites, public network providers often forward weak keys WEP- encryption can be fooled

Wireless LANs: How to make them secure Several solution available Firmware update (eliminate use of weak initialisation Vectors) Draft standard IEEE 802.1x (today only propietary implementations) use of additional VPN technology (IPsec, SSH) nomadic workers; use trusted public providers, who understand and adress the security management issue as well most important: think about security management, not only about technology!

The challenges can be addressed using safe security methods These solutions help enable Wireless e-business Technology Session cryptography/vpns File encryption Content and virus filtering Personal firewalls User and device authentication User authorisation Wireless PKI Intrusion detection Security management Secure and resilient industry solutions Architecture Structured design method Functional architecture Operational architecture End-to-end security design Processes Risk management process Incident management process Change management process Audit process Security awareness program Skills Risk management expertise IT security expertise Architecture and design expertise Industry knowledge

More wireless security information is available at ibm.com www.ibm.com/services/security

One part of IBM's answer to it www.ibm.com/services/security