Chapter06 - Security+ Guide to Network Security...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Objectives Describe the basic IEEE 802.11 wireless security protections Define the vulnerabilities of open system authentication, WEP, and device authentication Describe the WPA and WPA2 personal security models Explain how enterprises can implement wireless security 2
Background image of page 2
Security+ Guide to Network Security Fundamentals, Third Edition IEEE 802.11 Wireless Security Protections Institute of Electrical and Electronics Engineers (IEEE) The most widely known and influential organization for computer networking and wireless communications In the early 1980s, the IEEE began work on developing computer network architecture standards This work was called Project 802 In 1990, the IEEE formed a committee to develop a standard for WLANs That operate at a speed of 1 and 2 million bits per second (Mbps) 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition IEEE 802.11 Wireless Security Protections (continued) In 1997, the IEEE approved the IEEE 802.11 WLAN standard Revisions IEEE 802.11a IEEE 802.11b IEEE 802.11g IEEE 802.11n 4
Background image of page 4
Security+ Guide to Network Security Fundamentals, Third Edition Controlling Access Controlling wireless access of devices to the WLAN Accomplished by limiting a device’s access to the access point (AP) By restricting access to the AP, only those devices that are authorized are able to connect to the AP and become part of the wireless network The IEEE 802.11 standard does not specify how to implement controlling access Almost all wireless AP vendors implement access control through Media Access Control (MAC) address filtering 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 6 Controlling Access (continued)
Background image of page 6
Security+ Guide to Network Security Fundamentals, Third Edition 7 Controlling Access (continued)
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition Controlling Access (continued) MAC address filtering is usually implemented by permitting instead of preventing Wired Equivalent Privacy (WEP) Designed to ensure that only authorized parties can view transmitted wireless information Uses encryption to protect traffic The IEEE 802.11 committee designed WEP to meet the following criteria: Efficient, exportable, optional, self-synchronizing, and reasonably strong 8
Background image of page 8
Security+ Guide to Network Security Fundamentals, Third Edition Controlling Access (continued) IEEE 802.11 WEP shared secret keys must be a minimum of 64 bits in length The options for creating keys are as follows: 64-bit key 128-bit key Passphrase The AP and devices can hold up to four shared secret keys One of which must be designated as the default key 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 10
Background image of page 10
Security+ Guide to Network Security Fundamentals, Third Edition 11 Controlling Access (continued)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security+ Guide to Network Security Fundamentals, Third Edition 12 Controlling Access (continued)
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/13/2010 for the course CITX CITX 1150 taught by Professor P.whalen during the Fall '09 term at British Columbia Institute of Technology.

Page1 / 52

Chapter06 - Security+ Guide to Network Security...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online