SlideShare a Scribd company logo
Module 7 Wireless Security Module 7
Module Objectives This module will familiarize you with the following: Wi-Fi Security Issues  Bluetooth Cell Phone Policy and Procedures Module 7
Wireless Today Wi-Fi [Wireless Fidelity] Bluetooth Infrared RFID Satellite / Microwave
Wi-Fi 802.11 b / g / a / n Modes Infrastructure Ad-Hoc (Peer Mode) SSID MAC Filtering
Wireless Networks
Wireless Issues Vulnerabilities Signal Availability Easy access to signals  Not much required ($ or equipment) Signal Frequency Congestion Microwave / Cordless Phone / Neighbor SSID Announce False Security of Encryption
Wireless Countermeasures User Awareness Security Settings Confining the signal Disguising the label (SSID) Choosing allowed parties (MAC filter) Hiding the data (Encryption)
Wireless Trends Faster Speed 802.11n / 802.16 (WiMax) Better Security Stronger Encryption Authentication (802.1x)
Wi-Fi Encryption WEP WPA WPA2 EAP
Wi-Fi Risks Key Reuse (WEP is flawed) Sniffing Open Access (sniffed credentials) Denial of Service [DoS] Rogue Access Points Improperly Configured APs
Wi-Fi Tools NetStumbler Kismet AirCrack AirMagnet SnifferPro Ethereal
Handhelds Vulnerabilities Malware Theft (Device or Data) Exploit wireless signal Denial of Service HotSync
Handheld Countermeasures Firewalls / Anti-Malware Password protected No unnecessary data storage Encrypted transmissions 2-factor authentication 101
Bluetooth List of applications A typical Bluetooth  mobile phone   headset More prevalent applications of Bluetooth include: Wireless control of and communication between a  mobile phone  and a  hands-free   headset . This was one of the earliest applications to become popular.  Wireless networking between PCs in a confined space and where little bandwidth is required.  Wireless communications with PC input and output devices, the most common being the  mouse ,  keyboard  and  printer .  Transfer of files between devices with  OBEX .  Transfer of contact details, calendar appointments, and reminders between devices with OBEX.  Replacement of traditional wired  serial  communications in test equipment,  GPS receivers , medical equipment, bar code scanners, and traffic control devices.  For controls where  infrared  was traditionally used.  Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices.  Two seventh-generation  game consoles , Nintendo's  Wii [4]  and Sony's  PlayStation 3  use Bluetooth for their respective wireless controllers.  Dial-up internet access on personal computer or PDA using a data-capable mobile phone as a modem.
Most important security weaknesses - Bluetooth Problems with E0 Unit key PIN  Problems with E1 Location privacy Denial of service attacks
Other weaknesses No integrity checks No prevention of replay attacks Man in the middle attacks Turn off discovery Sometimes: default = no security …
Recommendations Never use unit keys!!!! Use long and sufficiently random PINs Always make sure security is turned on …
Interesting solutions Replace E0 and E1 with AES Use MACs to protect integrity Pseudonyms Identity based cryptography
Bluetooth Issues Hacking Movie(s)

More Related Content

PDF
IoT Device Security Tips
PPT
PPTX
Securing network devices
DOCX
Ist264 sowards h_chapter5labjournal
PPTX
Wi fi quiz
PPT
Open Options Evolutionary Trends
PDF
IoT security-arrow-roadshow #iotconfua
PPTX
Communication devices
IoT Device Security Tips
Securing network devices
Ist264 sowards h_chapter5labjournal
Wi fi quiz
Open Options Evolutionary Trends
IoT security-arrow-roadshow #iotconfua
Communication devices

What's hot (20)

PPTX
Wireless Networking
PPT
PPTX
Ethical hacking
DOCX
Todd D Jason Resume
PDF
Ga13
PPT
Heartbleed
PDF
UETS – Universal Ethernet Telecommunications Services
PPTX
PrivateGSM - Voice Encryption Technical Overview
PPTX
2017 conferencia-uets-mobilecongress l∓m
PPT
Mobile forensics
PPT
Voice communication security
PDF
Omitola mapping-the-security-challenges of IoT
PPT
Android and ios app development company- thorsignia
PPTX
Network security and System Admin
PPTX
SmartSecuritySolution_for_IoT
PPT
Security in bluetooth, cdma and umts
PPTX
Ethical hacking
PDF
Treball seguretat wifi
PPTX
Intrusion prevention systems
PDF
Datashur Presentation pin flash drive - Kingfin
Wireless Networking
Ethical hacking
Todd D Jason Resume
Ga13
Heartbleed
UETS – Universal Ethernet Telecommunications Services
PrivateGSM - Voice Encryption Technical Overview
2017 conferencia-uets-mobilecongress l∓m
Mobile forensics
Voice communication security
Omitola mapping-the-security-challenges of IoT
Android and ios app development company- thorsignia
Network security and System Admin
SmartSecuritySolution_for_IoT
Security in bluetooth, cdma and umts
Ethical hacking
Treball seguretat wifi
Intrusion prevention systems
Datashur Presentation pin flash drive - Kingfin
Ad

Viewers also liked (6)

PPT
Student Laptop Orientation
PPT
Module5 desktop-laptop-security-b
PPTX
Laptop physical security
PPT
Final Project, Power Point Presentation[1]
PPTX
Presentation on project report
PPTX
Final Year Project Presentation
Student Laptop Orientation
Module5 desktop-laptop-security-b
Laptop physical security
Final Project, Power Point Presentation[1]
Presentation on project report
Final Year Project Presentation
Ad

Similar to Module7 wireless security-b (20)

PPT
Mobile Device Security
PDF
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
PPT
Wi-Fi vs Bluetooth
PPT
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
PPT
Windows Mobile Enterprise Security Best Practices
PPTX
CNG 256 wireless wi-fi and bluetooth
PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
PDF
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
PPTX
WIRELESS GIGABIT TECHNOLOGY
PDF
A Study Of Wireless Network Security
PPTX
Wireless and how safe are you
PPT
Rj bluetooth
PPT
254460979-ishant abcd-098765432222-1.ppt
DOCX
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
PPTX
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
PPT
Wireless and WLAN Secuirty, Presented by Vijay
PPTX
Wifi- technology_moni
PPTX
R1x g12 wifi i
PPTX
Topic 4.0 wireless technology
PPTX
Wirless Security By Zohaib Zeeshan
Mobile Device Security
Mr. Vivek Ramachandran - Advanced Wi-­Fi Security Penetration Testing
Wi-Fi vs Bluetooth
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Windows Mobile Enterprise Security Best Practices
CNG 256 wireless wi-fi and bluetooth
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
WIRELESS GIGABIT TECHNOLOGY
A Study Of Wireless Network Security
Wireless and how safe are you
Rj bluetooth
254460979-ishant abcd-098765432222-1.ppt
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and Configuration
Wireless and WLAN Secuirty, Presented by Vijay
Wifi- technology_moni
R1x g12 wifi i
Topic 4.0 wireless technology
Wirless Security By Zohaib Zeeshan

Module7 wireless security-b

  • 1. Module 7 Wireless Security Module 7
  • 2. Module Objectives This module will familiarize you with the following: Wi-Fi Security Issues Bluetooth Cell Phone Policy and Procedures Module 7
  • 3. Wireless Today Wi-Fi [Wireless Fidelity] Bluetooth Infrared RFID Satellite / Microwave
  • 4. Wi-Fi 802.11 b / g / a / n Modes Infrastructure Ad-Hoc (Peer Mode) SSID MAC Filtering
  • 6. Wireless Issues Vulnerabilities Signal Availability Easy access to signals Not much required ($ or equipment) Signal Frequency Congestion Microwave / Cordless Phone / Neighbor SSID Announce False Security of Encryption
  • 7. Wireless Countermeasures User Awareness Security Settings Confining the signal Disguising the label (SSID) Choosing allowed parties (MAC filter) Hiding the data (Encryption)
  • 8. Wireless Trends Faster Speed 802.11n / 802.16 (WiMax) Better Security Stronger Encryption Authentication (802.1x)
  • 9. Wi-Fi Encryption WEP WPA WPA2 EAP
  • 10. Wi-Fi Risks Key Reuse (WEP is flawed) Sniffing Open Access (sniffed credentials) Denial of Service [DoS] Rogue Access Points Improperly Configured APs
  • 11. Wi-Fi Tools NetStumbler Kismet AirCrack AirMagnet SnifferPro Ethereal
  • 12. Handhelds Vulnerabilities Malware Theft (Device or Data) Exploit wireless signal Denial of Service HotSync
  • 13. Handheld Countermeasures Firewalls / Anti-Malware Password protected No unnecessary data storage Encrypted transmissions 2-factor authentication 101
  • 14. Bluetooth List of applications A typical Bluetooth mobile phone headset More prevalent applications of Bluetooth include: Wireless control of and communication between a mobile phone and a hands-free headset . This was one of the earliest applications to become popular. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communications with PC input and output devices, the most common being the mouse , keyboard and printer . Transfer of files between devices with OBEX . Transfer of contact details, calendar appointments, and reminders between devices with OBEX. Replacement of traditional wired serial communications in test equipment, GPS receivers , medical equipment, bar code scanners, and traffic control devices. For controls where infrared was traditionally used. Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices. Two seventh-generation game consoles , Nintendo's Wii [4] and Sony's PlayStation 3 use Bluetooth for their respective wireless controllers. Dial-up internet access on personal computer or PDA using a data-capable mobile phone as a modem.
  • 15. Most important security weaknesses - Bluetooth Problems with E0 Unit key PIN Problems with E1 Location privacy Denial of service attacks
  • 16. Other weaknesses No integrity checks No prevention of replay attacks Man in the middle attacks Turn off discovery Sometimes: default = no security …
  • 17. Recommendations Never use unit keys!!!! Use long and sufficiently random PINs Always make sure security is turned on …
  • 18. Interesting solutions Replace E0 and E1 with AES Use MACs to protect integrity Pseudonyms Identity based cryptography