wireless security

12
Wireless Security Tabatha Lakkala

Upload: abiba

Post on 22-Feb-2016

32 views

Category:

Documents


0 download

DESCRIPTION

Wireless Security. Tabatha Lakkala. Outline. Wireless Access Points Define Wireless Access Points Hidden and not so hidden dangers How to protect yourself and information Bluetooth and Cellphones Define Bluetooth H idden dangers How to protect yourself and information Phone Usage - PowerPoint PPT Presentation

TRANSCRIPT

Wireless Security

Wireless SecurityTabatha Lakkala

1Outline2Wireless Access Points

Define Wireless Access PointsHidden and not so hidden dangersHow to protect yourself and information

Bluetooth and CellphonesDefine BluetoothHidden dangersHow to protect yourself and informationPhone Usage

What is the bottom line?

Here is a brief overview of the topics I will cover today. I hope to show the hidden and not so hidden dangers in the workplace and at home that could potentially put sensitive information at risk. People tend to have a clear understanding of not talking about information over the phone and even shredding paperwork that could be used to gather sensitive information. What about the information we send to each other? In this day of technology I am not referring to snail-mail but email or even information stored on our blackberries; this briefing is not just intended for the workplace but your home network as well. 2Wireless Access Points3Wireless devices connecting to wired networkConnections in the home Connections in the officeWireless hotspots almost everywhere

What is a wireless access point? Simply put, it is a device that allows wireless devices to connect to a wired network.

Most people think of access points for home use. For example, in my house I have a desktop computer, 2 laptops and my phone; my router sends a broadcast in which the devices within range can use my internet connection. I am sure a lot of people, me included have looked for an open, unsecure connection they could use to get on a network to check email especially when moving and your internet has not been set up yet.

A lot of businesses are using this technology, every employee has a laptop so you can always take your files with you and when you are at work you just connect onto the local companys wireless network to do your work. Makes a lot of sense with growing technology, you wouldnt have to run cables and install drop boxes every time you expand you employee base.

Think about the last time you went to the bookstore (I like Barnes and Noble); remember all those people sitting around drinking coffee and soaking up the free Wi-Fi? They are tapping into essentially an unsecure, open wireless network. It is almost an unwritten rule nowadays; I can eat a Big Mac and get on the internet at lunch, however the Airport never seems to have free Wi-Fi.3Dangers4War Driving War ChalkingRogue Access Points (Evil Twin)

Most home networks have a very limited range when broadcasting their signal, depending on where your access point is located it may not even reach your neighbors house, but you should still be aware of what is lurking.

Big companies that have multiple access points and antennas to help broadcast their network for employees are at a greater risk of war driving and war chalking.

War driving is when a hacker drives around the neighborhood looking for unprotected networks. They can do this with a simple laptop or with a special program that help them scan for open wireless networks.

War chalking is actually marking the area, like a wall or sidewalk with a symbol that shows the availability of a Wi-Fi location and whether it is commercial or personal. The symbol on the slide shows an open node. War chalking is not very common today; it just shows the how far people will go to get free internet.

A rogue access point is a wireless access point but has either been installed on a secure companys network without authorization or been created to allow a hacker to conduct a man in the middle attack. For those that are not familiar with MITM, it is a form of eavesdropping, you believe you are talking or networking with the person on the distance end but in reality there is a person controlling the session. He can decided what messages are being sent, send different ones and see all the traffic on the network between the two parties. A good example would be you are at a coffee shop going to use the free Wi-Fi, you look on your computer or cell phone for open connections and see two open unsecure connections. One connection shows coffee house and one shows free coffee house Wi-Fi; which one would you probably choose. The second one would probably be accessed by most people and that could be a rogue access point so a hacker can get your information. Rogue access points on secure company networks are extremely dangerous because a MITM attack could get keys to decrypted messages that you are sending securely.

There are a lot of people that just want to check email; however there are a lot of people that want to do more than just check email for free, their intent is to gather information and cause chaos on your network.

4Network Protection5Secure your router/access pointTypes of antenna and locationNo broadcastingMAC filteringEnable encryption

There are different ways to protect your network either at home or business; here are simple ways to reduce your chances of someone hacking into your wireless network

Secure your wireless router or access point by setting a password. Some devices do have default passwords so ensure you change them and remember when setting a password make it complex.

Antenna types for business can vary by strength and some let you lower the power to reduce the signal range. Its a lot of trial and error in placement because buildings, location even weather can affect signal range.

Do not broadcast you SSID. An SSID is service set identifier, if you have a router in your home look on the bottom and you will see an SSID number. Most access point automatically broadcasts the SSID (the networks name) to make it easier for people to find and connect. When you turn it off, neighbors and wardrivers cannot find your network.

MAC (media access card) filtering is normally good for small companies; your MAC address is specific to your computer. Your router can deny everyone except those MAC address to be able to access your network.

Enable WPA (Wi-Fi protected Access) encryption, it is the most recent and secure form of encryption for wireless networks.

5Bluetooth & Cellphones6Wireless communication for small devices

Bluetooth creates a wireless connection for small mobile devices; it eliminates the need for a proprietary cable. Due to it low power consumption; its range is usually about 10 meters, a malicious user would have to be in a close range to be able to tap into your device. 6Bluetooth Dangers7BluejackingBluesnarfing

Two main dangers associated to Bluetooth are bluejacking and bluesnarfing.

Bluejacking is more annoying than malicious; it is an unwanted message sent by an unauthorized user. Have you ever walked around the mall and suddenly you receive a text message for a 20% off coupon at a store in the mall; thats an example of bluejacking.

Bluesnarfing is a bit more serious than bluejacking. Many devices use a discovery mode that can allow a hacker to detect and connect to another Bluetooth device. The unauthorized person can connect and access any data stored on the device such as pictures and contacts.7

Cellphone Protection8Know your security modesDisable the Bluetooth

How do you protect yourself from Bluetooth attacks?

First know your Bluetooth security modes, there are three modes:1. Nonsecure mode-no security features are enabled2. Service-level security mode-this is when applications on the device are responsible for the security3. Link-level security mode-the device is responsible for security; it is the most secure because it authenticates communication links before transmitting data and data can be encrypted

Second-disable your Bluetooth if you are not using it

8Phone Usage9What is the bottom line?10Security threats are risingLets protect our information Know your enemy and arm yourself

Computer security is probably one of the most talked about and most neglected risks to our information. Everyday new threats are developed and used, some just for fun to see how far a person can go and others to get information to cause harm. Lets protect ourselves the best we can, because given enough time and resources any network can be hacked so lets not make it easy. Changing default passwords, not broadcast our information, disabling unnecessary features are all ways we can protect our network. We know who is out there and we know what they want, so arm yourself and be prepared to fight for what is rightly yours.

10Summary11Wireless Access Points

Define Wireless Access PointsHidden and not so hidden dangersHow to protect yourself and information

Bluetooth and CellphonesDefine BluetoothHidden dangersHow to protect yourself and informationPhone Usage

What is the bottom line?

?Questions Samuelle, T.J. (2011). Mike Meyers Certification Passport: CompTIA Security+. New York: McGraw Hill Company.12References The Mike Meyers Passport Book is the most current book used for Security+ certification training and testing at the 3D0 schoolhouse.12