DOC PREVIEW
DMC ITSY 2400 - Chapter 8 Wireless Security

This preview shows page 1-2-3-22-23-24-44-45-46 out of 46 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 46 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Chapter 8ObjectivesIntroduction to Wireless NetworkingAttacks on Wireless NetworksWireless Network Support OrganizationsWhy Use a Wireless Network Instead of a Wired Network?Radio Wave TechnologiesSlide 8Slide 9IEEE 802.11 Radio Wave Networking (Continued)Slide 11How IEEE 802.11 Wireless Networks FunctionWireless ComponentsDirectional AntennaOmnidirectional AntennaWireless Networking Access MethodsHandling Data ErrorsTransmission SpeedsInfrared Wireless NetworkingSlide 20Diffused Infrared Wireless CommunicationUsing Authentication to Disconnect802.11 Network TopologiesIBSS Wireless TopologyESS Wireless TopologyMultiple-Cell Wireless LANsBluetooth Radio Wave NetworkingAnatomy of Attacks on Wireless NetworksRogue Access PointAttacks Through Long-Range AntennasMan-in-the-Middle AttacksPitfalls of Wireless CommunicationsWireless Security MeasuresOpen System AuthenticationShared Key AuthenticationWired Equivalent Privacy (WEP)Slide 37Service Set Identifier (SSID)802.1x Security802.1i SecurityConfiguring Security for Wireless InterfacesWindows 2000 Professional Wireless Security TechniquesWindows XP Professional Wireless Security TechniquesRed Hat Linux Wireless Security TechniquesMac OS X Wireless Security TechniquesSummaryGuide to Operating System SecurityChapter 8Wireless Security2 Guide to Operating System SecurityObjectivesExplain wireless networking and why it is usedDescribe IEEE 802.11 radio wave networkingExplain Bluetooth networkingDescribe attacks on wireless networksDiscuss wireless security measuresConfigure security for wireless interfaces in workstation operating systems3 Guide to Operating System SecurityIntroduction to Wireless NetworkingEnables communications where a wired network is impracticalReduces installation costsProvides “anywhere” accessEnables easier small and home office networkingEnables data access to fit the application4 Guide to Operating System SecurityAttacks on Wireless NetworksMany opportunities, particularly through sniffer softwareDifficult or impossible to detect5 Guide to Operating System SecurityWireless Network Support OrganizationsWireless LAN Association (WLANA)WINLAB6 Guide to Operating System SecurityWhy Use a Wireless Network Instead of a Wired Network?A wired network can be difficult or impossible to install in some situations7 Guide to Operating System SecurityRadio Wave TechnologiesNetwork applications use high frequencies measured in hertzLine-of-sight transmissionSpread spectrum technologyPopular technologiesIEEE 802.11 standardBluetooth8 Guide to Operating System SecurityRadio Wave Technologies9 Guide to Operating System SecurityRadio Wave TechnologiesAdvantagesRelatively inexpensiveEasy to installProvide anywhere accessOffer an alternative for hard-to-cable areasDisadvantagesDo not have speeds to match 100Mbps communicationsFrequencies may experience interference10 Guide to Operating System SecurityIEEE 802.11 Radio Wave Networking (Continued)Advantages in terms of compatibility and reliabilityDevices are not proprietaryEncompasses fixed and mobile stationsRecognizes indoor and outdoor communications11 Guide to Operating System SecurityIEEE 802.11 Radio Wave Networking (Continued)Kinds of communicationDiscrete units (asynchronous)Governed by time restrictions12 Guide to Operating System SecurityHow IEEE 802.11 Wireless Networks FunctionComponentsAccess methodsHandling of data errorsTransmission speedsAuthenticationTopologiesMultiple-cell wireless LANs13 Guide to Operating System SecurityWireless ComponentsWireless NIC (WNIC)Functions as a transmitter/receiver (transceiver)Access pointAntennasDirectional antennaOmnidirectional antenna14 Guide to Operating System SecurityDirectional Antenna15 Guide to Operating System SecurityOmnidirectional Antenna16 Guide to Operating System SecurityWireless Networking Access MethodsPriority-based accessCarrier Sense Multiple Access with Collision Avoidance (CSMA/CA)17 Guide to Operating System SecurityHandling Data ErrorsAutomatic repeat request (ARQ) characteristicHelps reduce communication errors created by sources of interference18 Guide to Operating System SecurityTransmission Speeds19 Guide to Operating System SecurityInfrared Wireless Networking802.11R standardCan be broadcast in a single direction or in all directionsTransmits in range of 100 GHz to 1000 THz20 Guide to Operating System SecurityInfrared Wireless NetworkingSecurity factorsDifficult to intercept without someone knowingNot susceptible to interference from RFI and EMIDisadvantages (but also make it more secure)Data transmission rates only reach up to 16 Mbps (directional) and can be less than 1 Mbps (omnidirectional)Does not go through walls21 Guide to Operating System SecurityDiffused Infrared Wireless Communication22 Guide to Operating System SecurityUsing Authentication to DisconnectPrevents two communicating stations from being inadvertently disconnected by a nonauthorized station23 Guide to Operating System Security802.11 Network TopologiesIndependent basic service set (IBSS) topologyConsists of two or more wireless stations that can be in communicationDoes not use an access pointExtended service set (ESS) topologyUses one or more access points to provide a larger service area than an IBSS topology24 Guide to Operating System SecurityIBSS Wireless Topology25 Guide to Operating System SecurityESS Wireless Topology26 Guide to Operating System SecurityMultiple-Cell Wireless LANsESS wireless topology that employs two or more access pointsInter-Access Point Protocol (IAPP)Roaming protocol that enables a mobile station to move from one cell to another without losing connection27 Guide to Operating System SecurityBluetooth Radio Wave NetworkingUses frequency hopping in the 2.4-GHz band designated by FCC for unlicensed ISM transmissionsUses time-division duplexing (TDD) for packet transmissions28 Guide to Operating System SecurityAnatomy of Attacks on Wireless NetworksAntennaWireless network interface cardGPSWar-driving software29 Guide to Operating System SecurityRogue Access PointWireless access point installed without knowledge of network administratorNot configured to have securityProvides an attacker with an unsecured entryway to packet communications30 Guide to Operating System


View Full Document

DMC ITSY 2400 - Chapter 8 Wireless Security

Download Chapter 8 Wireless Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 8 Wireless Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 8 Wireless Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?