Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.

Slides:



Advertisements
Présentations similaires
Présentation IDP Sondes de détection d’intrusion
Advertisements

WINS Windows Internet Name Service. What is WINS?  It does name resolution (?!) DNS resolves IP numbers and FQDN ARP resolves IP numbers and MAC addresses.
PERFORMANCE One important issue in networking is the performance of the network—how good is it? We discuss quality of service, an overall measurement.
1 Case Study 1: UNIX and LINUX Chapter History of unix 10.2 Overview of unix 10.3 Processes in unix 10.4 Memory management in unix 10.5 Input/output.
An Introduction To Two – Port Networks The University of Tennessee Electrical and Computer Engineering Knoxville, TN wlg.
Electronic Instrumentation Lecturer Touseef Yaqoob1 Sensors and Instrumentation Sensors and Instrumentation.
 Components have ratings  Ratings can be Voltage, Current or Power (Volts, Amps or Watts  If a Current of Power rating is exceeded the component overheats.
IP Multicast Text available on
Template Provided By Genigraphics – Replace This Text With Your Title John Smith, MD 1 ; Jane Doe, PhD 2 ; Frederick Smith, MD, PhD 1,2 1.
From Implementing Cisco IP Routing (ROUTE) Foundation Learning Guide by Diane Teare, Bob Vachon and Rick Graziani ( ) Copyright © 2015 Cisco Systems,
Update on Edge BI pricing January ©2011 SAP AG. All rights reserved.2 Confidential What you told us about the new Edge BI pricing Full Web Intelligence.
1. Neal Creative | click & Learn more Neal Creative © TIP │ Use the built-in c olor palette with green and yellow for callouts and accents Neal Creative.
Subject: CMS(Content Management System) Université Alioune DIOP de Bambey UFR Sciences Appliquées et Technologies de l’Information et de la Communication.
Overview of SUN’s Unix Campus-Booster ID : **XXXXX Copyright © SUPINFO. All rights reserved Introduction to Solaris 10.
TP4
The Basis of the Servqual Model The Gaps The Key Service Dimensions Causes & Solutions to Gaps.
Programmateurs connectés
Theme Three Speaking Questions
Principaux besoins de l’industrie aéronautique Le 26 mars 2014,
IGTMD réunion du 4 Mai 2007 CC IN2P3 Lyon
Theme Two Speaking Questions
1 S Transmission Methods in Telecommunication Systems (4 cr) Transmission Channels.
Illegal Immigration By: Barbara Choe Derek Montgomery.
Réunion service Instrumentation Activités CMS-Traces
Cross Cutting Mapping Project
Samples for evaluation from All Charts & Templates Packs for PowerPoint © All-PPT-Templates.comPersonal Use Only – not for distribution. All Rights Reserved.
Reflective verbs or Pronominal verbs
ABAQUS I Summary Program Capability Components of an ABAQUS Model Elements, Materials and Procedures Modules (analysis, pre and post processing) Input.
Quantum Computer A New Era of Future Computing Ahmed WAFDI ??????
the Periodic Table the Periodic Table 2017/2018 Made by : NEDJAR NASSIMA Made by : NEDJAR NASSIMA MS:HAMZA 1.
- User case - 3D curve length optimization
MATCHSLIDE : INT contribution Patrick HORAIN Hichem ATTI Waheb LARBI Presented as : "TELESLIDE: Technical aspects ", Jacques Klossa & Patrick Horain, Joint.
COMMENT PRÉPARER UN GÂTEAU MICHELIN A*
F RIENDS AND FRIENDSHIP Project by: POPA BIANCA IONELA.
Copyright 2007 – Biz/ed Globalisation.
FIBER DISTRIBUTED DATA INTERFACE (FDDI) ADNAN MASOOD ECE DEPT
Quiz What are the different Copper cable types ? How is STP better than UTP ? What type of cable should we use between : Router-Switch, PC-Router, Hub-Switch.
P&ID SYMBOLS. P&IDs Piping and Instrumentation Diagrams or simply P&IDs are the “schematics” used in the field of instrumentation and control (Automation)
Leadership Styles Mrs. Keith Main Types of Leadership Styles 1.The Autocratic or Authoritarian Leader 2.The Democratic or Participative Leader.
1 ISO/TC 176/SC 2/N1219 ISO 9001:2015 Revision overview - General users July 2014.
G. Peter Zhang Neurocomputing 50 (2003) 159–175 link Time series forecasting using a hybrid ARIMA and neural network model Presented by Trent Goughnour.
High-Availability Linux Services And Newtork Administration Bourbita Mahdi 2016.
REMOVE EFFECTIVELY YOUR HOME WITH CHEKS ECO-ENERGY Win in quality of life and save on your electicity bills by realizing a renovation of your home.
Cryopreservation. Benefits Of Freezing Cells Benefits Of Freezing A Validated Stock Of Cells –Genotypic drift –Senescence leading to extinction of cell.
Forum national sur l’IMT de 2004.
Definition Division of labour (or specialisation) takes place when a worker specialises in producing a good or a part of a good.
Mr MAJDOUB Med Amine Computer Science 9th Level FB : Mr Majdoub Classroom.
1-1 Introduction to ArcGIS Introductions Who are you? Any GIS background? What do you want to get out of the class?
Vulnerability Analysis by : Wail Belhouchet Dr Djouad Tarek 1.
Question formation In English, you can change a statement into a question by adding a helping verb (auxiliary): does he sing? do we sing? did they sing.
Manometer lower pressure higher pressure P1P1 PaPa height 750 mm Hg 130 mm higher pressure 880 mm Hg P a = h = +- lower pressure 620 mm Hg.
WRITING A PROS AND CONS ESSAY. Instructions 1. Begin your essay by introducing your topic Explaining that you are exploring the advantages and disadvantages.
SÉCURITÉ RÉSEAU 420-SR1-T420-ESR-TT Cisco CCNA Security Session hiver 2017 A.Bouzidi.
© by Vista Higher Learning, Inc. All rights reserved.4A.1-1 Point de départ In Leçon 1A, you saw a form of the verb aller (to go) in the expression ça.
By : HOUSNA hebbaz Computer NetWork. Plane What is Computer Network? Type of Network Protocols Topology.
Les formes et les couleurs
Ftpworldwide-Company FTP Worldwide has a simple, secure and flexible solution for your managed file transfer and file sharing needs. Unlike many of our.
HUAWEI TECHNOLOGIES CO., LTD. VLAN Principles. Copyright © 2016 Huawei Technologies Co., Ltd. All rights reserved. Page 2 Foreword A Virtual Local Area.
Avoiding the Pitfalls of Bad Slides Tips to be Covered Outlines Slide Structure Fonts Colour Background Graphs Spelling and Grammar Conclusions Questions.
Laboratory Information Management Systems (LIMS) Lindy A. Brigham Div of Plant Pathology and Microbiology Department of Plant Sciences PLS 595D Regulatory.
Techniques de l’eau et calcul des réseaux
University : Ammar Telidji Laghouat Faculty : Technology Department : Electronics 3rd year Telecommunications Professor : S.Benghouini Student: Tadj Souad.
Presented by:  RAMMACHE Soumia  KAISSARI Kawther.
Les Jours de la Semaine ©  Copyright Kapow! 2017.
IMPROVING PF’s M&E APPROACH AND LEARNING STRATEGY Sylvain N’CHO M&E Manager IPA-Cote d’Ivoire.
M’SILA University Information Communication Sciences and technology
Transcription de la présentation:

Wi-Fi the Standard and Security

What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit data through the air. Wi-Fi is based on the standard: – a – b – g

Wi-Fi Alliance Non-profit standards organization. Global organization that created the Wi-Fi brand name. Formerly the Wireless Ethernet Compatibility Alliance.

Wi-Fi Certification The Wi-Fi CERTIFIED logo from the Wi-Fi Alliance. – Rigorous interoperability testing requirements. – Certifies the interoperability of products from the many different vendors.

Wi-Fi HotSpots Pay Services – Boingo – iPass – Cingular Wireless – MyConnect – WayPort Free Wi-Fi in Springfield: – Downtown: Springfield Chamber of Commerce – Mud House – Panera Bread

Brief History IEEE (Institute of Electrical and Electronics Engineers) established the Group in Specifications for standard ratified in Initial speeds were 1 and 2 Mbps. IEEE modified the standard in 1999 to include: – b – a – g was added in IEEE Created standard, but Wi-Fi Alliance certifies products

Standard is primarily concerned with the lower layers of the OSI model. Data Link Layer – Logical Link Control (LLC). – Medium Access Control (MAC). Physical Layer – Physical Layer Convergence Procedure (PLCP). – Physical Medium Dependent (PMD).

802.11b Standard Well-supported, stable, and cost effective, but runs in the 2.4 GHz range that makes it prone to interference from other devices (microwave ovens, cordless phones, etc) and also has security disadvantages. Limits the number of access points in range of each other to three. Has 11 channels, with 3 non-overlapping, and supports rates from 1 to 11 Mbps, but realistically about 4-5 Mbps max. Uses direct-sequence spread-spectrum technology.

802.11g Standard Extension of b, with the same disadvantages (security and interference). Has a shorter range than b. Is backwards compatible with b so it allows or a smooth transition from 11b to 11g. Flexible because multiple channels can be combined for faster throughput, but limited to one access point. Runs at 54 Mbps, but realistically about Mbps and about 14 Mbps when b associated Uses frequency division multiplexing

802.11a Standard Completely different from 11b and 11g. Flexible because multiple channels can be combined for faster throughput and more access points can be co-located. Shorter range than 11b and 11g. Runs in the 5 GHz range, so less interference from other devices. Has 12 channels, 8 non-overlapping, and supports rates from 6 to 54 Mbps, but realistically about 27 Mbps max Uses frequency division multiplexing

Advantages Freedom – You can work from any location that you can get a signal. Setup Cost – No cabling required. Flexibility – Quick and easy to setup in temp or permanent space. Scaleable – Can be expanded with growth. Mobile Access – Can access the network on the move.

Disadvantages Speed – Slower than cable. Range – Affected by various medium. – Travels best through open space. – Reduced by walls, glass, water, etc Security – Greater exposure to risks. – Unauthorized access. – Compromising data. – Denial of service.

Basic Security Strategies Block your Service Set Identifier (SSID) from being broadcast. – Wireless beacon so PCs can easily find the access point. Change the default network name in the access point. Change the default access point password. Center the access point in the middle of the building/house.

Media Access Control (MAC) Filtering Every network device has a unique MAC address – Allocated by the manufacturer. MAC Filtering only allows certain addresses access. Mostly for home use. – Tedious to implement on a large scale

Wired Equivalency Protocol (WEP) Basic encryption technology. – Uses an RC4 stream cipher. Pseudo-random bytes. – Two versions: 64-bit and 128-bit versions. Built into Wi-Fi certified equipment. – Implemented at the MAC level. Protects radio signal between device and access point. – Does not protect data beyond the access point. Uses static encryption keys. – Easy to crack. Still better then nothing.

Wi-Fi Protected Access (WPA) Designed to replace WEP. – Firmware update. – 128-bit Temporal Key Integrity Protocol (TKIP) encryption. Uses a master key that is regularly changed. – User authentication. – Data Integrity. Protects radio signal between device and access point. Built into Wi-Fi certified equipment. – Implemented at the MAC level. Available in two versions: – WPA2 Personal. – WPA2 Enterprise.

Wi-Fi Protected Access 2 (WPA2) Designed to replace WEP. – 128-bit Advanced Encryption Standard (AES). Based on the IEEE i standard. Provides government level security. Also available in two versions: – WPA2 Personal. – WPA2 Enterprise.

Extended EAP EAP - Extensible Authentication Protocol. Addition to the Wi-Fi Protected Access. – Used in internal network. Extra security for enterprise and government Wi-Fi LANs. Several versions available.

Virtual Private Network (VPN) Creates a secure virtual “tunnel” from remote device to VPN server. – Creates an encryption scheme. – Requires authentication. Works across the internet. Many types and levels of VPN technology. – May include hardware and software components. – Some very expensive. – Windows provides a basic implementation in its server software.

Firewall Can make the network or computer invisible to the internet. Block unauthorized users. Monitor and control flow of data to/from a network or computer. Many types and levels of firewall technology. – Hardware and software combinations – Software only versions. ZoneAlarm Many devices provide basic firewall capability. – Gateways and access points. Network address translation. – Windows XP operating system.

Kerberos Created at MIT. Network authentication based on key distribution. – Nodes provide their own authentication. Checks for data stream integrity. – Checks for modification. Uses Data Encryption Standard (DES).

Bringing it all together Any combination of these security techniques can be used. The more security the more of a hassle. – Important when supporting users.