wireless (security) self-test for fun

137
Wireless (Security) Self-Test for fun Presented by: J.D. Fulp, CISSP-ISSEP [email protected] Senior Lecturer of Computer Science Naval Postgraduate School (NPS) Monterey, CA USA Unclassified 1 MWC Q&A Session

Upload: triage

Post on 17-Jan-2016

24 views

Category:

Documents


2 download

DESCRIPTION

Unclassified. Wireless (Security) Self-Test for fun. Presented by: J.D. Fulp , CISSP-ISSEP [email protected] Senior Lecturer of Computer Science Naval Postgraduate School (NPS) Monterey, CA USA. Late Addition to the Workshop!. Hey... I just want to attend and listen/learn!. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless (Security)        Self-Test for fun

Wireless (Security) Self-Test for fun

Presented by:J.D. Fulp, [email protected] Lecturer of Computer

ScienceNaval Postgraduate School (NPS)Monterey, CA USA

Unclassified

1MWC Q&A Session

Page 2: Wireless (Security)        Self-Test for fun

Late Addition to the Workshop! Hey... I just want to attend and listen/learn!

MWC Q&A Session 2

Page 3: Wireless (Security)        Self-Test for fun

Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more

“sophisticated” listener/attendee

MWC Q&A Session 3

Page 4: Wireless (Security)        Self-Test for fun

Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more

“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in

these docs

MWC Q&A Session 4

Page 5: Wireless (Security)        Self-Test for fun

Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more

“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in

these docs Modification to the New Idea: The docs mostly read with

the excitement of an encyclopedia, and are likely known by these “select” attendees, so...

MWC Q&A Session 5

Page 6: Wireless (Security)        Self-Test for fun

Late Addition to the Workshop! Hey... I just want to attend and listen/learn! Idea: Review a few related docs in order to be a more

“sophisticated” listener/attendee New Idea (thanks John!): Present on what you found in

these docs Modification to the New Idea: The docs mostly read with

the excitement of an encyclopedia, and are likely known by these “select” attendees, so...

Present in a Q&A form to assess knowledge and perhaps “incite” discussion

MWC Q&A Session 6

Page 7: Wireless (Security)        Self-Test for fun

Which “related docs” ?

DoDD 8100.2 Use of Commercial Wireless Devices, Services, and

Technologies in the Department of Defense (DoD) Global Information Grid (GIG)

NIST SP800-124 Guidelines on Cell Phone and PDA Security

DISA STIG Wireless Overview

DISA STIG Mobile and Wireless Device Addendum to the Wireless STIG

MWC Q&A Session 7

Page 8: Wireless (Security)        Self-Test for fun

What KIND of Questions? Miscellaneous Wireless Terms/Technology Security: Threats Security: Vulnerabilities Security: Security_Controls Security: Policy Security: Best Practices Security: Technology

By the way... don’t expect any special “ordering” of any of this!

MWC Q&A Session 8

Page 9: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhat does WiFi stand for?

MWC Q&A Session 9

Page 10: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhat does WiFi stand for?

Wireless Fidelity

MWC Q&A Session 10

Page 11: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich term applies to Bluetooth?

a.WMAN

b.WGAN

c. WPAN

d.WLAN

MWC Q&A Session 11

Page 12: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich term applies to Bluetooth?

a.WMAN

b.WGAN

c. WPAN

d.WLAN

MWC Q&A Session 12

Page 13: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich operates at 5GHz?

a.802.11a

b.802.11b

c. 802.11g

d.802.11n

MWC Q&A Session 13

Page 14: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich operates at 5GHz?

a.802.11a

b.802.11b

c. 802.11g

d.802.11n

MWC Q&A Session 14

Page 15: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhat is IEEE 802.16 ?

a.WiMAX

b.ZigBee

c. EDGE

d.Bluetooth

MWC Q&A Session 15

Page 16: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhat is IEEE 802.16 ?

a.WiMAX

b.ZigBee

c. EDGE

d.Bluetooth

MWC Q&A Session 16

Page 17: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWho uses CDMA based cell tech.?

a.Verizon

b.AT&T

MWC Q&A Session 17

Page 18: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWho uses CDMA based cell tech.?

a.Verizon

b.AT&T

MWC Q&A Session 18

Page 19: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the shortest range RF tech?

a.802.11

b.Vicinity RFID (smart card/chip)

c. WiMAX

d.Proximity RFID (smart card/chip)

MWC Q&A Session 19

Page 20: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the shortest range RF tech?

a.802.11

b.Vicinity RFID (smart card/chip)

c. WiMAX

d.Proximity RFID (smart card/chip)

MWC Q&A Session 20

Page 21: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyThe two main 802.11 “modes” are Ad

Hoc mode and...

MWC Q&A Session 21

Page 22: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyThe two main 802.11 “modes” are Ad

Hoc mode and...

Infrastructure mode

MWC Q&A Session 22

Page 23: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyThe “Evil Twin” threat is aka...

a.A promiscuous eavesdropper

b.An RF-jammer box

c. “War-driving” setup

d.a rogue wireless access point

MWC Q&A Session 23

Page 24: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyThe “Evil Twin” threat is aka...

a.A promiscuous eavesdropper

b.An RF-jammer box

c. “War-driving” setup

d.a rogue wireless access point

MWC Q&A Session 24

Page 25: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is THE DoD IA Directive?

a.8200.1

b.8500.1

c. 8510.01

d.5200.40

MWC Q&A Session 25

Page 26: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is THE DoD IA Directive?

a.8200.1

b.8500.1

c. 8510.01

d.5200.40

MWC Q&A Session 26

Page 27: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the correct ordering for typical

operating range?a. IrDA—Bluetooth—802.11—WiMax--GSM

b.802.11—IrDA—GSM—Bluetooth—WiMAX

c. Bluetooth—802.11—IrDA—WiMAX—GSM

d.GSM—IrDA—Bluetooth—802.11--WiMAX

MWC Q&A Session 27

Page 28: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the correct ordering for typical

operating range?a. IrDA—Bluetooth—802.11—WiMax--GSM

b.802.11—IrDA—GSM—Bluetooth—WiMAX

c. Bluetooth—802.11—IrDA—WiMAX—GSM

d.GSM—IrDA—Bluetooth—802.11--WiMAX

MWC Q&A Session 28

Page 29: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyMost Cell phones operate in the...

a.HF range (3-30MHz)

b.HF and VHF range (3-300MHz)

c. UHF range (300MHz-3GHz)

d.SHF range (3-30GHz)

MWC Q&A Session 29

Page 30: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyMost Cell phones operate in the...

a.HF range (3-30MHz)

b.HF and VHF range (3-300MHz)

c. UHF range (300MHz-3GHz)

d.SHF range (3-30GHz)

MWC Q&A Session 30

Page 31: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the closest to typical longest

operating range of WiMAX?a.1 mile

b.5 miles

c. 30 miles

d.100 miles

MWC Q&A Session 31

Page 32: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the closest to typical longest

operating range of WiMAX?a.1 mile

b.5 miles

c. 30 miles

d.100 miles

MWC Q&A Session 32

Page 33: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the closest to typical longest

operating range of Bluetooth?a.1 meter

b.10 meters

c. 100 meters

d.1 mile

MWC Q&A Session 33

Page 34: Wireless (Security)        Self-Test for fun

Misc Wireless Terms/TechnologyWhich is the closest to typical longest

operating range of Bluetooth?a.1 meter

b.10 meters (most often seen/quoted)

c. 100 meters (mentioned in Wireless STIG)

d.1 mile

MWC Q&A Session 34

Page 35: Wireless (Security)        Self-Test for fun

8100.2

What’s a PIM, PED, PDA?

MWC Q&A Session 35

Page 36: Wireless (Security)        Self-Test for fun

8100.2

What’s a PIM, PED, PDA?

Personal Information Mgr

Personal Electronic Device

Personal Digital Assistant

MWC Q&A Session 36

Page 37: Wireless (Security)        Self-Test for fun

8100.2

Which does 8100.2 apply to?a.Receive-only pagers

b.GPS receivers

c. Implanted medical devices

d.RF energy between RFID tags

Section 2.5

MWC Q&A Session 37

Page 38: Wireless (Security)        Self-Test for fun

8100.2

Which does 8100.2 apply to?

None of these

Section 2.5

MWC Q&A Session 38

Page 39: Wireless (Security)        Self-Test for fun

8100.2

Exceptions/deviations from required security controls usually (always?) require the approval of the DAA. What is a DAA?

Section 4.1.2

MWC Q&A Session 39

Page 40: Wireless (Security)        Self-Test for fun

8100.2

Exceptions/deviations from required security controls usually (always?) require the approval of the DAA. What is a DAA?

Designated Approving Authority

Section 4.1.2

MWC Q&A Session 40

Page 41: Wireless (Security)        Self-Test for fun

8100.2

Which pub is heavily referenced for security issues related to crypto-graphic module validation?

a.FIPS 199

b.DCID 6/9

c. FIPS 140-2

d.NSTISSI 4009

MWC Q&A Session 41

Page 42: Wireless (Security)        Self-Test for fun

8100.2

Which pub is heavily referenced for security issues related to crypto-graphic module validation?

a.FIPS 199

b.DCID 6/9

c. FIPS 140-2

d.NSTISSI 4009

MWC Q&A Session 42

Page 43: Wireless (Security)        Self-Test for fun

8100.2

Measures taken to mitigate DoS attacks should address?

a.Only external threats

b.Only internal threats

c. Potential “friendly interference”

d.All of the above

Section 4.1.4

MWC Q&A Session 43

Page 44: Wireless (Security)        Self-Test for fun

8100.2

Measures taken to mitigate DoS attacks should address?

a.Only external threats

b.Only internal threats

c. Potential “friendly interference”

d.All of the above

Section 4.1.4

MWC Q&A Session 44

Page 45: Wireless (Security)        Self-Test for fun

8100.2

The term (title) CTTA pops up often when discussing wireless emissions and security. What is CTTA?

a.Certified TEMPEST Technical Authority

b.Communications TecSec Tech. Auth.

c. Counter-technical Transmission Analyst

d.Consolidated TEMPEST Testing AgencySection 4.3

MWC Q&A Session 45

Page 46: Wireless (Security)        Self-Test for fun

8100.2

The term (title) CTTA pops up often when discussing wireless emissions and security. What is CTTA?

a.Certified TEMPEST Technical Authority

b.Communications TecSec Tech. Auth.

c. Counter-technical Transmission Analyst

d.Consolidated TEMPEST Testing AgencySection 4.3

MWC Q&A Session 46

Page 47: Wireless (Security)        Self-Test for fun

8100.2

What is the DITSCAP?

Section 4.5

MWC Q&A Session 47

Page 48: Wireless (Security)        Self-Test for fun

8100.2

What is the DITSCAP?

DoD Information Technology Security Certification and Accreditation Process

Section 4.5

MWC Q&A Session 48

Page 49: Wireless (Security)        Self-Test for fun

8100.2

(T/F) DoD component must actively screen for wireless devices [including] active e-m sensing at the premises to detect/prevent unauthor-ized access of DoD ISs... to ensure compliance with DITSCAP ongoing accreditation.

Section 4.5

MWC Q&A Session 49

Page 50: Wireless (Security)        Self-Test for fun

8100.2

(T/F) DoD component must actively screen for wireless devices [including] active e-m sensing at the premises to detect/prevent unauthor-ized access of DoD ISs... to ensure compliance with DITSCAP ongoing accreditation.

Section 4.5

MWC Q&A Session 50

Page 51: Wireless (Security)        Self-Test for fun

8100.2

PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted.

Section 4.7

MWC Q&A Session 51

Page 52: Wireless (Security)        Self-Test for fun

8100.2

PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted.

Insufficient input... what additional info do you think we need to answer this?

Section 4.7

MWC Q&A Session 52

Page 53: Wireless (Security)        Self-Test for fun

8100.2

PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted to operate wirelessly while directly connected.

Section 4.7

MWC Q&A Session 53

Page 54: Wireless (Security)        Self-Test for fun

8100.2

PEDs that are connected directly to a DoD-wired network (e.g., hot-sync to a workstation) (shall / shall-not) be permitted to operate wirelessly while directly connected.

Section 4.7

MWC Q&A Session 54

Page 55: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

When discussing/categorizng vuln-nerabilities, the term CAT is used. What is CAT short for?

Section 1.4

MWC Q&A Session 55

Page 56: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

When discussing/categorizng vuln-nerabilities, the term CAT is used. What is CAT short for?

Severity Category Code

Section 1.4

MWC Q&A Session 56

Page 57: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

If analysis of your system reveals a CAT I severity...

a.You can still receive an ATO

b.To get an ATO, this must be mitigated.

c. You may have <= 1 CAT I and still get an ATO

d.You cannot get an ATO with even a single CAT I severity

Section 1.4

MWC Q&A Session 57

Page 58: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

If analysis of your system reveals a CAT I severity...

a.You can still receive an ATO

b.To get an ATO, this must be mitigated.

c. You may have <= 1 CAT I and still get an ATO

d.You cannot get an ATO with even a single CAT I severity

Section 1.4

MWC Q&A Session 58

Page 59: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

CAT codes are also used to charac-terize attackers/threats. How is each defined?

a.CAT 1

b.CAT 2

c. CAT 3

Section 1.4

MWC Q&A Session 59

Page 60: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

CAT codes are also used to charac-terize attackers/threats. How is each defined?

a.CAT 1-no special skill/resource required

b.CAT 2-some sp s/r or mux-exploitations required

c. CAT 3-requires unusual expertise, additional information, and/or mux-exploitations

Section 1.4

MWC Q&A Session 60

Page 61: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Two types of WLAN APs may be used in a DoD network: enclave-NIPRNet Connected, and Internet Gateway Only Connected. What’s the difference?

Section 2.2.1

MWC Q&A Session 61

Page 62: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Two types of WLAN APs may be used in a DoD network: Enclave-NIPRNet Connected, and Internet Gateway Only Connected. What’s the difference? Enclave provides connectivity to the inside network, whereas Gateway provides a connection to the Internet only

MWC Q&A Session 62

Page 63: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Which WAP devices are currently apvd for class’d WLAN comms?

a.SecNet11 (Harris Corp.)

b.SecNet54 (Harris Corp.)

c. KOV-26 Talon (L3 Communications)

Section 2.2.4

MWC Q&A Session 63

Page 64: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Which WAP devices are currently apvd for class’d WLAN comms?

a.SecNet11 (Harris Corp.)

b.SecNet54 (Harris Corp.)

c. KOV-26 Talon (L3 Communications)

Section 2.2.4

MWC Q&A Session 64

Page 65: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

To what level of classification?a.SecNet11 (Harris Corp.)

b.SecNet54 (Harris Corp.)

c. KOV-26 Talon (L3 Communications)

Section 2.2.4

MWC Q&A Session 65

Page 66: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

To what level of classification?a.SecNet11 (Harris Corp.) - S

b.SecNet54 (Harris Corp.) - TS

c. KOV-26 Talon (L3 Communications) - TS

Section 2.2.4

MWC Q&A Session 66

Page 67: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

What’s a WIDS?

Section 2.2.4

MWC Q&A Session 67

Page 68: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

What’s a WIDS?

Wireless Intrusion Detection System

Section 2.2.4

MWC Q&A Session 68

Page 69: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

ZigBee is closest in “mission” to?a.RFID

b.Bluetooth

c. 802.11

d.WiMAX

Section 2.5

MWC Q&A Session 69

Page 70: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

ZigBee is closest in “mission” to?a.RFID

b.Bluetooth

c. 802.11

d.WiMAX

Section 2.5

MWC Q&A Session 70

Page 71: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Which best describes the difference between ZigBee & Bluetooth?

a.ZigBee uses less power (better battery life)

b.ZigBee has lower data rate

c. ZigBee used for device-device comms whereas Bluetooth is used for human interface devices

d.ZigBee is not used by DoDSection 2.5

MWC Q&A Session 71

Page 72: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Which best describes the difference between ZigBee & Bluetooth?

a.ZigBee uses less power (better battery life)

b.ZigBee has lower data rate

c. ZigBee used for device-device comms whereas Bluetooth is used for human interface devices

d.ZigBee is not used by DoDSection 2.5

MWC Q&A Session 72

Page 73: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Cellular...are generally considered (more / less) secure than public WLAN or WiMAX...and should be preferred by DoD sites for wireless remote access to DoD networks.

Section 2.7

MWC Q&A Session 73

Page 74: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

Cellular...are generally considered (more / less) secure than public WLAN or WiMAX...and should be preferred by DoD sites for wireless remote access to DoD networks.

Section 2.7

MWC Q&A Session 74

Page 75: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

A recent study reported over ___% of wireless devices identified during a wireless scan at several U.S. airports to be illegitimate (i.e., not part of the airport sanctioned wireless network)

Section 2.7

MWC Q&A Session 75

Page 76: Wireless (Security)        Self-Test for fun

Wireless STIG Overview

A recent study reported over 50 % of wireless devices identified during a wireless scan at several U.S. airports to be illegitimate (i.e., not part of the airport sanctioned wireless network)

Whoa!

Section 2.7

MWC Q&A Session 76

Page 77: Wireless (Security)        Self-Test for fun

SP800-124

Basically, what is 1G cellular?a.< 100kbps

b.Analog

c. Digital (voice only, no data)

d.TDMA (vice CDMA)

Section 2.5

MWC Q&A Session 77

Page 78: Wireless (Security)        Self-Test for fun

SP800-124

Basically, what is 1G cellular?a.< 100kbps

b.Analog

c. Digital (voice only, no data)

d.TDMA (vice CDMA)

Section 2.5

MWC Q&A Session 78

Page 79: Wireless (Security)        Self-Test for fun

SP800-124

Which are the two dominant digital cellular networks in the U.S.?

a. iDEN

b.TDMA

c. CDMA

d.GSM

MWC Q&A Session 79

Page 80: Wireless (Security)        Self-Test for fun

SP800-124

Which are the two dominant digital cellular networks in the U.S.?

a. iDEN

b.TDMA

c. CDMA

d.GSM

MWC Q&A Session 80

Page 81: Wireless (Security)        Self-Test for fun

SP800-124

Indicate GSM or CDMA regarding these “evolutionary” enhancements

a.EDGE

b.1xRTT

c. EV-DO

d.UMTS

Section 2.5

MWC Q&A Session 81

Page 82: Wireless (Security)        Self-Test for fun

SP800-124

Indicate GSM or CDMA regarding these “evolutionary” enhancements

a.EDGE -- GSM

b.1xRTT -- CDMA

c. EV-DO -- CDMA

d.UMTS -- GSM

Section 2.5

MWC Q&A Session 82

Page 83: Wireless (Security)        Self-Test for fun

SP800-124

What does SIM stand for, and in which cell system (GSM or CDMA) do we find it?

Section 2.2.2

MWC Q&A Session 83

Page 84: Wireless (Security)        Self-Test for fun

SP800-124

What does SIM stand for, and in which cell system (GSM or CDMA) do we find it?

Subscriber Identity Module, GSM

Section 2.2.2

MWC Q&A Session 84

Page 85: Wireless (Security)        Self-Test for fun

SP800-124

What is the primary purpose of the SIM?

Section 2.2.2

MWC Q&A Session 85

Page 86: Wireless (Security)        Self-Test for fun

SP800-124

What is the primary purpose of the SIM?

Authenticates the phone to the netowork

Section 2.2.2

MWC Q&A Session 86

Page 87: Wireless (Security)        Self-Test for fun

SP800-124

The IMSI is the # in the SIM which uniquely identifies the phone. What is IMSI?

Section 2.2.2

MWC Q&A Session 87

Page 88: Wireless (Security)        Self-Test for fun

SP800-124

The IMSI is the # in the SIM which uniquely identifies the phone. What is IMSI?

International Mobile Subscriber Identity

Section 2.2.2

MWC Q&A Session 88

Page 89: Wireless (Security)        Self-Test for fun

SP800-124

Is SIM-like functionality on the horizon for CDMA networks?

Section 2.2.2

MWC Q&A Session 89

Page 90: Wireless (Security)        Self-Test for fun

SP800-124

Is SIM-like functionality on the horizon for CDMA networks?

Yes, one such reference is to a R-UIM (Removable – User Identity Module)

Section 2.2.2

MWC Q&A Session 90

Page 91: Wireless (Security)        Self-Test for fun

SP800-124

With respect to the discussion of keys and key strength (entropy), what is the distinction between an on-line and an off-line attack?

MWC Q&A Session 91

Page 92: Wireless (Security)        Self-Test for fun

SP800-124

With respect to the discussion of keys and key strength (entropy), what is the distinction between an on-line and an off-line attack?

On-line: attacker is “bruting” via the device’s primary/intended secret entry interface

Off-line: attacker is “bruting” directly to the device; bypassing the normal/intended interface

MWC Q&A Session 92

Page 93: Wireless (Security)        Self-Test for fun

SP800-124

Short (4-8 digits) PINs are often criticized as insufficient to thwart a guessing attack. What added security mechanism can mitigate the risk of such small PIN spaces?

MWC Q&A Session 93

Page 94: Wireless (Security)        Self-Test for fun

SP800-124

Short (4-8 digits) PINs are often criticized as insufficient to thwart a guessing attack. What added security mechanism can mitigate the risk of such small PIN spaces?

For on-line attacks, only permit a small number of incorrect guesses

MWC Q&A Session 94

Page 95: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen discussing IA security controls,

we typically chose them based upon the confidentiality level and MAC of the information on the system in question. What is MAC?

Section 1.2

MWC Q&A Session 95

Page 96: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen discussing IA security controls,

we typically chose them based upon the confidentiality level and MAC of the information on the system in question. What is MAC?

Mission Assurance Category

Section 1.2

MWC Q&A Session 96

Page 97: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumHow does the MAC relate to the CIA

Triad of Confidentiality, Integrity, and Availability?

Section 1.4

MWC Q&A Session 97

Page 98: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumHow does the MAC relate to the CIA

Triad of Confidentiality, Integrity, and Availability?

It’s a combination of the Integrity and Availability (MAC1=HH, MAC2=HM, and MAC3=BB)

Section 1.4

MWC Q&A Session 98

Page 99: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device Addendum7 areas are addressed in this adden-

dum for security guidelines1 OS Security

2 __________ Security

3 Transmission Protection

4 __________ (emanations) Security

5 Access Control

6 Data Protection

7 User TrainingSection 4.1

MWC Q&A Session 99

Page 100: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device Addendum7 areas are addressed in this adden-

dum for security guidelines1 OS Security

2 Application Security

3 Transmission Protection

4 TEMPEST (emanations) Security

5 Access Control

6 Data Protection

7 User TrainingSection 4.1

MWC Q&A Session 100

Page 101: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumOne big issue with OS security is the

notion of a separation kernel. What is the purpose of a separation kernel?

Section 4.1.1

MWC Q&A Session 101

Page 102: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumOne big issue with OS security is the notion of a

separation kernel. What is the purpose of a separation kernel?

Basically; a) protect against possible high-to-low (data flows) and b) separate subjects and objects so that access must be granted IAW a policy-enforcing mechanism

Section 4.1.1

MWC Q&A Session 102

Page 103: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen the topic of access control

arises, we often see a reference to AAA. What is AAA?

Section 4.1.5

MWC Q&A Session 103

Page 104: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen the topic of access control

arises, we often see a reference to AAA. What is AAA?

Authenticate, Authorize, Audit

Section 4.1.5

MWC Q&A Session 104

Page 105: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumRegarding the area of data protection, we

often hear about DAR and FDE. What is each of these?

Data-At-Rest and Full-Disk Encryption. The idea is that we are beginning to pay attention to encrypting data at-rest in addition to data in-transit; which we have been doing for quite a long(er) time.

Section 4.1.6

MWC Q&A Session 105

Page 106: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat is the necessary precursor to

access control?a.authorization decision

b.audit solution

c. I&A

d.object classification

Section 2.5

MWC Q&A Session 106

Page 107: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat is the necessary precursor to

access control?a.authorization decision

b.audit solution

c. I&A (Identification & Authentication)

d.object classification

App. D (Security Mechanisms)

MWC Q&A Session 107

Page 108: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 3 methods used to

authenticate (i.e., prove and identity claim)?

a.What you ________

b.What you ________

c. What you ________

App. D

MWC Q&A Session 108

Page 109: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 3 methods used to

authenticate (i.e., prove and identity claim)?

a.What you know

b.What you have

c. What you are

App. D.1

MWC Q&A Session 109

Page 110: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen you get down to brass tacks...

they’re all have forms. The real distinction is...

a._______________________________

b._______________________________

MWC Q&A Session 110

Page 111: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhen you get down to brass tacks...

they’re all have forms. The real distinction is...

a.whether it’s a unique & permanent part of you (biometric), or

b.whether it is a secret (in which case it will either be one of public or private)

MWC Q&A Session 111

Page 112: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumAs usual (INFOSEC) we are

ultimate-ly concerned with protecting the CIA of the wireless information. What are the two main tools to protect the C and I ?

a.__________ Security (think low tech)

b.____________(hashing and encryption)

MWC Q&A Session 112

Page 113: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumAs usual (INFOSEC) we are

ultimate-ly concerned with protecting the CIA of the wireless information. What are the two main tools to protect the C and I ?

a.Physical Security (think low tech)

b.Cryptography (hashing and encryption)

MWC Q&A Session 113

Page 114: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 3 primary encryption

algorithms approved for use (2 are symmetric and 1 is asymmetric)?

a._____

b._____

c. _____

MWC Q&A Session 114

Page 115: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 3 primary encryption

algorithms approved for use (2 are symmetric and 1 is asymmetric)?

a.DES (Date Encryption Std, older)

b.AES (Advanced Encryption Std, newer)

c. RSA (the asymmetric one)

MWC Q&A Session 115

Page 116: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 2 primary hash

algorithms approved for use to support integrity check mechanisms?

a._____

b._____

MWC Q&A Session 116

Page 117: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhat are the 2 primary hash

algorithms approved for use to support integrity check mechanisms?

a.MD5 (Message Digest 5, 128 bits)

b.SHA (Secure Hash Algorithm, comes in 160, 224, 256, 384, and 512 bit versions)

MWC Q&A Session 117

Page 118: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumFor secret-based authentication

that’s easier to setup, we generally employ ____; whereas for secret-based authentication that’s more scalable, we generally employ ____.

Choices are: a) PKI, b) biometrics, or c) pre-shared (symmetric) secrets

MWC Q&A Session 118

Page 119: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumFor secret-based authentication

that’s easier to setup, we generally employ __a_; whereas for secret-based authentication that’s more scalable, we generally employ _c_.

Choices are: a) PKI, b) biometrics, or c) pre-shared (symmetric) secrets

MWC Q&A Session 119

Page 120: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumAES has three key lengths, 128, 192,

and 256. Which are appropriate for secret information, and which for top secret?

a.Secret: __________

b.Top Secret: __________

MWC Q&A Session 120

Page 121: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumAES has three key lengths, 128, 192,

and 256. Which are appropriate for secret information, and which for top secret?

a.Secret: all three

b.Top Secret: only 192 and 256

MWC Q&A Session 121

Page 122: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich of these 3 WiFi security tech-

nologies (protocols) is approved for DoD use?

a.WEP

b.WPA-TKIP

c. 802.11i

App. D

MWC Q&A Session 122

Page 123: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich of these 3 WiFi security tech-

nologies (protocols) is approved for DoD use?

a.WEP

b.WPA-TKIP

c. 802.11i

App. D

MWC Q&A Session 123

Page 124: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device Addendum802.11i is perhaps more commonly

know as _______?

MWC Q&A Session 124

Page 125: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device Addendum802.11i is perhaps more commonly

know as WPA2, and also RSN (Robust Security Network)?

This uses the stronger (and FIPS 140-2 approved) AES cipher whereas WEP and WPA(1) use the weaker RC4 stream cipher

MWC Q&A Session 125

Page 126: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumTwo methods of “RF Monitoring” (for

wireless networks) are discussed. One is to employ a “roving” sniffer; what do you think is the other?

MWC Q&A Session 126

Page 127: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumTwo methods of “RF Monitoring” (for

wireless networks) are discussed. One is to employ a “roving” sniffer; what do you think is the other?

Install wireless sensors at various locations (to cover all RF “space”) on the network and have them report back to a central management/monitor console

MWC Q&A Session 127

Page 128: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich attack is the most serious in

terms of potential for damage?a.sniffing/observation

b.data modification (blind)

c. data replay (or impersonation)

d.denial of service

e.man-in-the-middle

MWC Q&A Session 128

Page 129: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich attack is the most serious in

terms of potential for damage?a.sniffing/observation

b.data modification (blind)

c. data replay (or impersonation)

d.denial of service

e.man-in-the-middle

MWC Q&A Session 129

Page 130: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumEAP comes in several different

“flavors” and is an important security tool for wireless environments. What does EAP stand for?

MWC Q&A Session 130

Page 131: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumEAP comes in several different

“flavors” and is an important security tool for wireless environments. What does EAP stand for?Extensible Authentication Protocol (basically a “meta-protocol” that employs secrets to authenticate via a dedicated authentication server)

MWC Q&A Session 131

Page 132: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumMost/all wireless security best

practices say to disable SSID. What is SSID and why should it be disabled?

MWC Q&A Session 132

Page 133: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumIPSec is a popular layer-3 VPN. Which

mode should be used if the tunnel endpoints should begin and end at/on two communicating hosts?

a.Tunnel mode

b.Transport mode

c. AH mode

d.ESP mode

MWC Q&A Session 133

Page 134: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumIPSec is a popular layer-3 VPN. Which

mode should be used if the tunnel endpoints should begin and end at/on two communicating hosts?

a.Tunnel mode

b.Transport mode

c. AH mode

d.ESP mode

MWC Q&A Session 134

Page 135: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich mode of IPSec should be used

if we wish to provide confidentiality?a.Tunnel mode

b.Transport mode

c. AH mode

d.ESP mode

MWC Q&A Session 135

Page 136: Wireless (Security)        Self-Test for fun

Mobile & Wireless Device AddendumWhich mode of IPSec should be used

if we wish to provide confidentiality?a.Tunnel mode

b.Transport mode

c. AH mode

d.ESP mode

MWC Q&A Session 136

Page 137: Wireless (Security)        Self-Test for fun

Finished