nscf data forencics 1
nscf data forencics 1
Wireless Security
Some of the key factors contributing to the higher security risk of wireless
networks compared to wired networks include:
Wireless networking
typically involves Some wireless
broadcast Wireless devices Some wireless devices, such as
communications, are far more devices, such as sensors and robots,
which is far more portable and smartphones and may be left
susceptible to mobile than wired unattended in
tablets, have
eavesdropping and devices remote and/or
jamming than wired sophisticated
operating systems hostile locations
networks
but limited memory
and processing
Wireless networks are
resources with
which to counter This greatly
also more vulnerable to This mobility results increases their
active attacks that threats, including
in a number of risks denial of service vulnerability to
exploit vulnerabilities in
communications and malware physical attacks
protocols
Wireless Network Threats
Accidental association Identity theft (MAC spoofing)
◦ Company wireless LANs in close proximity may create ◦ This occurs when an attacker is able to eavesdrop
overlapping transmission ranges on network traffic and identify the MAC address of
◦ A user intending to connect to one LAN may a computer with network privileges
unintentionally lock on to a wireless access point from
a neighboring network Man-in-the-middle attacks
◦ This attack involves persuading a user and an
Malicious association access point to believe that they are talking to
◦ In this situation, a wireless device is configured to each other when in fact the communication is
appear to be a legitimate access point, enabling the going through an intermediate attacking device
operator to steal passwords from legitimate users and ◦ Wireless networks are particularly vulnerable to
then penetrate a wired network through a legitimate such attacks
wireless access point
Denial of service (DoS)
Ad hoc networks ◦ This attack occurs when an attacker continually
◦ These are peer-to-peer networks between wireless bombards a wireless access point or some other
computers with no access point between them accessible wireless port with various protocol
◦ Such networks can pose a security threat due to a lack messages designed to consume system resources
of a central point of control ◦ The wireless environment lends itself to this type
of attack because it is so easy for the attacker to
direct multiple wireless messages at the target
Nontraditional networks
◦ Personal network Bluetooth devices, barcode readers,
and handheld PDAs pose a security risk in terms of Network injection
both eavesdropping and spoofing ◦ This attack targets wireless access points that are
exposed to nonfiltered network traffic, such as
routing protocol messages or network
management messages
Securing Wireless Transmissions
The principal threats to wireless transmission are eavesdropping,
altering or inserting messages, and disruption
To deal with eavesdropping, two types of countermeasures are
appropriate:
◦ Signal-hiding techniques
◦ Turn off SSID broadcasting by wireless access points
◦ Assign cryptic names to SSIDs
◦ Reduce signal strength to the lowest level that still provides requisite coverage
◦ Locate wireless access points in the interior of the building, away from windows and exterior
walls
◦ Encryption
◦ Is effective against eavesdropping to the extent that the encryption keys are secured
Securing Wireless Access Points
The main threat involving wireless access points is unauthorized access
to the network
The principal approach for preventing such access is the IEEE 802.1x
standard for port-based network access control
◦ The standard provides an authentication mechanism for devices wishing to
attach to a LAN or wireless network
◦ The use of 802.1x can prevent rogue access points and other unauthorized
devices from becoming insecure backdoors
Securing Wireless Networks
Use encryption
Interaction with
other systems
• It is easy to find and • An attacker can use
install third-party • Unless an organization has location information to
applications on mobile control of all the devices involved determine where the
devices and this poses the in synchronization, there is device and user are
risk of installing malicious considerable risk of the located, which may be of
software organization’s data being stored use to the attacker
in an unsecured location, plus the
Use of applications risk of the introduction of
malware Use of location
created by unknown
services
parties
© 2017 PEARSON EDUCATION, LTD., ALL RIGHTS RESERVED.
IEEE 802.11
Wireless LAN Overview
IEEE 802 is a committee that has developed standards for a wide range
of local area networks (LANs)
In 1990 the IEEE 802 Committee formed a new working group, IEEE
802.11, with a charter to develop a protocol and transmission
specifications for wireless LANs (WLANs)
Since that time, the demand for WLANs at different frequencies and
data rates has exploded
Table 18.1
IEEE 802.11 Terminology
IEEE 802.11i
Keys for Data
Confidentiality
and
Integrity
Protocols