Chapter 8ObjectivesIntroduction to Wireless NetworkingAttacks on Wireless NetworksWireless Network Support OrganizationsWhy Use a Wireless Network Instead of a Wired Network?Radio Wave TechnologiesSlide 8Slide 9IEEE 802.11 Radio Wave Networking (Continued)Slide 11How IEEE 802.11 Wireless Networks FunctionWireless ComponentsDirectional AntennaOmnidirectional AntennaWireless Networking Access MethodsHandling Data ErrorsTransmission SpeedsInfrared Wireless NetworkingSlide 20Diffused Infrared Wireless CommunicationUsing Authentication to Disconnect802.11 Network TopologiesIBSS Wireless TopologyESS Wireless TopologyMultiple-Cell Wireless LANsBluetooth Radio Wave NetworkingAnatomy of Attacks on Wireless NetworksRogue Access PointAttacks Through Long-Range AntennasMan-in-the-Middle AttacksPitfalls of Wireless CommunicationsWireless Security MeasuresOpen System AuthenticationShared Key AuthenticationWired Equivalent Privacy (WEP)Slide 37Service Set Identifier (SSID)802.1x Security802.1i SecurityConfiguring Security for Wireless InterfacesWindows 2000 Professional Wireless Security TechniquesWindows XP Professional Wireless Security TechniquesRed Hat Linux Wireless Security TechniquesMac OS X Wireless Security TechniquesSummaryGuide to Operating System SecurityChapter 8Wireless Security2 Guide to Operating System SecurityObjectivesExplain wireless networking and why it is usedDescribe IEEE 802.11 radio wave networkingExplain Bluetooth networkingDescribe attacks on wireless networksDiscuss wireless security measuresConfigure security for wireless interfaces in workstation operating systems3 Guide to Operating System SecurityIntroduction to Wireless NetworkingEnables communications where a wired network is impracticalReduces installation costsProvides “anywhere” accessEnables easier small and home office networkingEnables data access to fit the application4 Guide to Operating System SecurityAttacks on Wireless NetworksMany opportunities, particularly through sniffer softwareDifficult or impossible to detect5 Guide to Operating System SecurityWireless Network Support OrganizationsWireless LAN Association (WLANA)WINLAB6 Guide to Operating System SecurityWhy Use a Wireless Network Instead of a Wired Network?A wired network can be difficult or impossible to install in some situations7 Guide to Operating System SecurityRadio Wave TechnologiesNetwork applications use high frequencies measured in hertzLine-of-sight transmissionSpread spectrum technologyPopular technologiesIEEE 802.11 standardBluetooth8 Guide to Operating System SecurityRadio Wave Technologies9 Guide to Operating System SecurityRadio Wave TechnologiesAdvantagesRelatively inexpensiveEasy to installProvide anywhere accessOffer an alternative for hard-to-cable areasDisadvantagesDo not have speeds to match 100Mbps communicationsFrequencies may experience interference10 Guide to Operating System SecurityIEEE 802.11 Radio Wave Networking (Continued)Advantages in terms of compatibility and reliabilityDevices are not proprietaryEncompasses fixed and mobile stationsRecognizes indoor and outdoor communications11 Guide to Operating System SecurityIEEE 802.11 Radio Wave Networking (Continued)Kinds of communicationDiscrete units (asynchronous)Governed by time restrictions12 Guide to Operating System SecurityHow IEEE 802.11 Wireless Networks FunctionComponentsAccess methodsHandling of data errorsTransmission speedsAuthenticationTopologiesMultiple-cell wireless LANs13 Guide to Operating System SecurityWireless ComponentsWireless NIC (WNIC)Functions as a transmitter/receiver (transceiver)Access pointAntennasDirectional antennaOmnidirectional antenna14 Guide to Operating System SecurityDirectional Antenna15 Guide to Operating System SecurityOmnidirectional Antenna16 Guide to Operating System SecurityWireless Networking Access MethodsPriority-based accessCarrier Sense Multiple Access with Collision Avoidance (CSMA/CA)17 Guide to Operating System SecurityHandling Data ErrorsAutomatic repeat request (ARQ) characteristicHelps reduce communication errors created by sources of interference18 Guide to Operating System SecurityTransmission Speeds19 Guide to Operating System SecurityInfrared Wireless Networking802.11R standardCan be broadcast in a single direction or in all directionsTransmits in range of 100 GHz to 1000 THz20 Guide to Operating System SecurityInfrared Wireless NetworkingSecurity factorsDifficult to intercept without someone knowingNot susceptible to interference from RFI and EMIDisadvantages (but also make it more secure)Data transmission rates only reach up to 16 Mbps (directional) and can be less than 1 Mbps (omnidirectional)Does not go through walls21 Guide to Operating System SecurityDiffused Infrared Wireless Communication22 Guide to Operating System SecurityUsing Authentication to DisconnectPrevents two communicating stations from being inadvertently disconnected by a nonauthorized station23 Guide to Operating System Security802.11 Network TopologiesIndependent basic service set (IBSS) topologyConsists of two or more wireless stations that can be in communicationDoes not use an access pointExtended service set (ESS) topologyUses one or more access points to provide a larger service area than an IBSS topology24 Guide to Operating System SecurityIBSS Wireless Topology25 Guide to Operating System SecurityESS Wireless Topology26 Guide to Operating System SecurityMultiple-Cell Wireless LANsESS wireless topology that employs two or more access pointsInter-Access Point Protocol (IAPP)Roaming protocol that enables a mobile station to move from one cell to another without losing connection27 Guide to Operating System SecurityBluetooth Radio Wave NetworkingUses frequency hopping in the 2.4-GHz band designated by FCC for unlicensed ISM transmissionsUses time-division duplexing (TDD) for packet transmissions28 Guide to Operating System SecurityAnatomy of Attacks on Wireless NetworksAntennaWireless network interface cardGPSWar-driving software29 Guide to Operating System SecurityRogue Access PointWireless access point installed without knowledge of network administratorNot configured to have securityProvides an attacker with an unsecured entryway to packet communications30 Guide to Operating System
View Full Document