lec-01-wlan-basics

lec-01-wlan-basics - WIRELESS NETWORKS SECURITY Shambhu...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 1 Shambhu Upadhyaya University at Buffalo Buffalo, New York 14260 WIRELESS NETWORKS SECURITY
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 2 Acknowledgments DoD Capacity Building Grant NSF Capacity Building Grant Cisco Equipment Grant Anusha Iyer, Pavan Rudravaram, Himabindu Challapalli, Parag Jain, Mohit Virendra (former students) Ameya Sanzgiri (current student)
Background image of page 2
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 3 Motivation Military Success of Desert Storm in Gulf War attributed to Wireless communication Military superiority may not win war anymore Mass destruction possible with Cyber weapons Data sharing is critical in coalition partners Wireless is key for communication in the intelligence community Public/Private Today, a large no. of Internet connections happen from mobile devices Wireless is ubiquitous, it is here to stay Info. must flow in and out of government to private sectors
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 4 Wireless – Another Perspective Why and when of Wireless No way to run the cable Convenience of less hardware – e.g., Conferences Temporary setups Costs of Cabling too expensive Scalability and Flexibility - Easy to grow Reduced cost of ownership - initial costs the same as the wired networks Mobility
Background image of page 4
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 5 Mobility and Security Increased mobility has become way of life Wireless is at the first and last miles Presents itself to security problems Proper security must be practiced A new security culture needs to emerge across the entire Internet user community Hacker ethic “destructiveness is inquisitiveness” – must be resisted Instead, proper online security habits must be practiced
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 6 Good Security Thinking Don’t talk to anyone you don’t know Accept nothing without a guarantee Treat everyone as enemy until proven otherwise Don’t trust your friends for long Use well-tried solutions Watch the ground you are standing on for cracks Good habits Changing passwords, disconnecting when not in use, run antivirus daily, change default password, use appropriate security and encryption services
Background image of page 6
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 7 Wireless Security – the Course An approach of best business practice due to the nature of the topic Components of the course Threat model Security protocol Keys and passwords Key entropy Authentication Authorization Encryption
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 8 Why is Wireless Different First know the distinction between communication and computing (cellular networks vs. data networks) Wireless – info. travels through free-space on certain
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 02/16/2011 for the course CSE 566 taught by Professor Dr.shamboo during the Fall '10 term at SUNY Buffalo.

Page1 / 39

lec-01-wlan-basics - WIRELESS NETWORKS SECURITY Shambhu...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online