tailieunhanh - Lecture Information systems security - Chapter 4: Wireless network security

After studying chapter 4 you should be able to: Describe the basic IEEE wireless security protections; define the vulnerabilities of open system authentication, WEP, and device authentication; describe the WPA and WPA2 personal security models; explain how enterprises can implement wireless security. | Wireless Network Security TJX Data Breach (Marshalls, . Maxx, HomeGoods, . Wright ) TJX used WEP security They lost 45 million customer records They settled the lawsuits for $ million Objectives Describe the basic IEEE wireless security protections Define the vulnerabilities of open system authentication, WEP, and device authentication Describe the WPA and WPA2 personal security models Explain how enterprises can implement wireless security IEEE Wireless Security Protections IEEE Institute of Electrical and Electronics Engineers (IEEE), 1963 In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802 In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks) At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps) IEEE WLAN Standard In 1997, the IEEE approved the IEEE WLAN standard Revisions IEEE (2,4 GHz, 2 Mbps) IEEE (5 GHz, 54 Mbps, 25- 75m) IEEE ( GHz, 11 Mbps, 35- 100m) IEEE ( GHz, 54 Mbps, 25- 75m) IEEE ( GHz, 5GHz, 300 Mbps, 50- 125m) Controlling Access to a WLAN Access is controlled by limiting a device’s access to the access point (AP) Only devices that are authorized can connect to the AP One way: Media Access Control (MAC) address filtering CSE uses this technique (unfortunately) Controlling Access MAC Address Filtering Wired Equivalent Privacy (WEP) Designed to ensure that only authorized parties can view transmitted wireless information Uses encryption to protect traffic WEP was designed to be: Efficient and reasonably strong WEP Keys WEP secret keys can be 64 or 128 bits long The AP and devices can hold up to four shared secret keys One of which must be designated as the default key WEP Encryption Process Transmitting with WEP Device Authentication Before a computer can connect to a WLAN, it must be authenticated Types of authentication . | Wireless Network Security TJX Data Breach (Marshalls, . Maxx, HomeGoods, . Wright ) TJX used WEP security They lost 45 million customer records They settled the lawsuits for $ million Objectives Describe the basic IEEE wireless security protections Define the vulnerabilities of open system authentication, WEP, and device authentication Describe the WPA and WPA2 personal security models Explain how enterprises can implement wireless security IEEE Wireless Security Protections IEEE Institute of Electrical and Electronics Engineers (IEEE), 1963 In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802 In 1990, the IEEE formed a committee to develop a standard for WLANs (Wireless Local Area Networks) At that time WLANs operated at a speed of 1 to 2 million bits per second (Mbps) IEEE WLAN Standard In 1997, the IEEE approved the IEEE WLAN standard Revisions IEEE (2,4 GHz, 2 .

TÀI LIỆU LIÊN QUAN
TỪ KHÓA LIÊN QUAN