SlideShare une entreprise Scribd logo
1  sur  56
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security
TJX Data Breach ,[object Object],[object Object],[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11 Wireless Security Protections
Institute of Electrical and Electronics Engineers (IEEE) ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11 WLAN Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access to a WLAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access
MAC Address Filtering
MAC Address Filtering ,[object Object],[object Object],[object Object]
Wired Equivalent Privacy (WEP) ,[object Object],[object Object],[object Object],[object Object],Security+ Guide to Network Security Fundamentals, Third Edition
WEP Keys ,[object Object],[object Object],[object Object]
 
WEP Encryption Process
Transmitting with WEP
Device Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Vulnerabilities of IEEE 802.11 Security Open system authentication MAC address filtering WEP
Open System Authentication ,[object Object],[object Object],[object Object],[object Object]
Turning Off Beaconing ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
MAC Address Filtering Weaknesses ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP ,[object Object],[object Object],[object Object],[object Object]
Cracking WEP ,[object Object],[object Object],[object Object]
Personal Wireless Security ,[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Temporal Key Integrity Protocol (TKIP) ,[object Object],[object Object],[object Object],[object Object]
Message Integrity Check (MIC) ,[object Object],[object Object],[object Object]
WPA2 Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
WPA2 Personal Security ,[object Object],[object Object],[object Object]
PSK Key Management Weaknesses ,[object Object],[object Object],[object Object],[object Object]
Pre-Shared Key Weakness ,[object Object],[object Object],[object Object],[object Object]
Cracking WPA
WPA2 Personal Security (continued) ,[object Object],[object Object],[object Object]
WPA and WPA2 Compared
Enterprise Wireless Security Two models: IEEE 802.11i  WPA and WPA2 models
IEEE 802.11i ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11i ,[object Object]
802.1x Authentication
IEEE 802.11i (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object]
WPA Enterprise Security ,[object Object],[object Object],[object Object]
WPA Enterprise Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WPA2 Enterprise Security ,[object Object],[object Object],[object Object]
Enterprise and Personal Wireless Security Models
Enterprise Wireless Security Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Wireless Security Devices (continued)
Enterprise Wireless Security Devices (continued) ,[object Object],[object Object],[object Object]
 
 
Enterprise Wireless Security Devices (continued) ,[object Object],[object Object],[object Object]
Rogue Access Point Discovery Tools ,[object Object],[object Object],[object Object]
Types of Wireless Probes ,[object Object],[object Object],[object Object],[object Object]
 

Contenu connexe

Tendances

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

Tendances (20)

Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Network security
Network securityNetwork security
Network security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Email security
Email securityEmail security
Email security
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Network Security
Network SecurityNetwork Security
Network Security
 
WEP
WEPWEP
WEP
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
Network security
Network security Network security
Network security
 
PGP S/MIME
PGP S/MIMEPGP S/MIME
PGP S/MIME
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
User authentication
User authenticationUser authentication
User authentication
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 

Similaire à Ch06 Wireless Network Security

4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 

Similaire à Ch06 Wireless Network Security (20)

Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijay
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 

Plus de Information Technology (20)

Web303
Web303Web303
Web303
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SAN
SANSAN
SAN
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 

Dernier

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Ch06 Wireless Network Security