{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

lec-01-wlan-basics

lec-01-wlan-basics - WIRELESS NETWORKS SECURITY Shambhu...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 1 Shambhu Upadhyaya Computer Science & Eng. University at Buffalo Buffalo, New York 14260 WIRELESS NETWORKS SECURITY
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 2 Acknowledgments DoD Capacity Building Grant NSF Capacity Building Grant Cisco Equipment Grant Anusha Iyer, Pavan Rudravaram, Himabindu Challapalli, Parag Jain, Mohit Virendra (former students) Ameya Sanzgiri (current student)
Image of page 2
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 3 Motivation Military Success of Desert Storm in Gulf War attributed to Wireless communication Military superiority may not win war anymore Mass destruction possible with Cyber weapons Data sharing is critical in coalition partners Wireless is key for communication in the intelligence community Public/Private Today, a large no. of Internet connections happen from mobile devices Wireless is ubiquitous, it is here to stay Info. must flow in and out of government to private sectors
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 4 Wireless – Another Perspective Why and when of Wireless No way to run the cable Convenience of less hardware – e.g., Conferences Temporary setups Costs of Cabling too expensive Scalability and Flexibility - Easy to grow Reduced cost of ownership - initial costs the same as the wired networks Mobility
Image of page 4
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 5 Mobility and Security Increased mobility has become way of life Wireless is at the first and last miles Presents itself to security problems Proper security must be practiced A new security culture needs to emerge across the entire Internet user community Hacker ethic “destructiveness is inquisitiveness” – must be resisted Instead, proper online security habits must be practiced
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 6 Good Security Thinking (Edney & Arbaugh ’04) Don’t talk to anyone you don’t know Accept nothing without a guarantee Treat everyone as enemy until proven otherwise Don’t trust your friends for long Use well-tried solutions Watch the ground you are standing on for cracks Good habits Changing passwords, disconnecting when not in use, run antivirus daily, change default password, use appropriate security and encryption services
Image of page 6
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 7 Wireless Security – the Course An approach of best business practice due to the nature of the topic Components of the course Threat model Security protocol Keys and passwords Key entropy Authentication Authorization Encryption
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1/11/2010 Wireless Networks Security Shambhu J Upadhyaya 8 Why is Wireless Different First know the distinction between communication and computing (cellular networks vs. data networks) Wireless – info. travels through free-space on certain spectrum allocations
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern