Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

An attack that sends unsolicited messages to bluetooth-enabled devices

22/12/2020 Client: saad24vbs Deadline: 7 Days

Security+ Guide to Network Security Fundamentals, Fourth Edition


Chapter 8


Wireless Network Security


1


Wireless Network Security


Wireless data communications have revolutionized computer networking


Wireless data networks found virtually everywhere


Wireless networks have been targets for attackers


Early wireless networking standards had vulnerabilities


Changes in wireless network security yielded security comparable to wired networks


Security+ Guide to Network Security Fundamentals, Fourth Edition


2


2


Blue Tooth


Bluetooth ( )


Wireless technology


Uses short-range radio frequency transmissions


Provides for rapid, ad-hoc device pairings


Example: smartphone and Bluetooth headphones, Bose Mini etc


Personal Area Network (PAN) technology


Two types of Bluetooth network topologies


Piconet


Scatternet


Security+ Guide to Network Security Fundamentals, Fourth Edition


3


3


Bluetooth


Piconet


Established when two Bluetooth devices come within range of each other


One device (master) controls all wireless traffic


Other device (slave) takes commands


Active slaves can send transmissions


Parked slaves are connected but not actively participating


4


4


Scatternet


Group of piconets with connections between different piconets


5


Bluetooth


5


Security+ Guide to Network Security Fundamentals, Fourth Edition


6


Bluejacking


Attack that sends unsolicited messages to Bluetooth-enabled devices


Text messages, images, or sounds


Considered more annoying than harmful


No data is stolen


Popular in Europe


Guerilla Marketing


Bluetooth Attacks


6


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


Security+ Guide to Network Security Fundamentals, Fourth Edition


7


7


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


All patched years ago


However…


Security+ Guide to Network Security Fundamentals, Fourth Edition


8


8


Wireless Attacks (cont’d.)


Security+ Guide to Network Security Fundamentals, Fourth Edition


9


Good news is that most phones have patches


Next attack surface is Echo, Google Home devices


Patches available also


Best bet, disengage BlueTooth when in public


9


Wireless History


Institute of Electrical and Electronics Engineers (IEEE)


Most influential organization for computer networking and wireless communications


Dates back to 1884


Began developing network architecture standards in the 1980s


1997: release of IEEE 802.11


Standard for wireless local area networks (WLANs)


Higher speeds added in 1999: IEEE 802.11b


Security+ Guide to Network Security Fundamentals, Fourth Edition


10


10


Wireless LAN


IEEE 802.11a


Specifies maximum rated speed of 54Mbps using the 5GHz spectrum


IEEE 802.11g


Preserves stable and widely accepted features of 802.11b


Increases data transfer rates similar to 802.11a


IEEE 802.11n


Ratified in 2009


Speed – up to 300Mbps in real world competing networks


Coverage area – double a, b, g


Security+ Guide to Network Security Fundamentals, Fourth Edition


11


11


Wireless LAN


Access point (AP) major parts


Base Station for wireless network


Antenna and radio transmitter/receiver send and receive wireless signals


Bridging software to interface wireless devices to other devices


Wired network interface allows it to connect by cable to standard wired network


12


12


Wireless LAN Attacks


Wireless broadband routers


Single hardware device containing AP, firewall, router, and DHCP server


Wireless networks have been vulnerable targets for attackers


Not restricted to a cable


Types of wireless LAN attacks


Discovering the network


Attacks through the RF spectrum


Attacks involving access points


Security+ Guide to Network Security Fundamentals, Fourth Edition


13


13


Wireless LAN Attacks (cont’d.)


Discovering the network


One of first steps in attack is to discover presence of a network


Beaconing


AP sends signal at regular intervals to announce its presence and provide connection information


Wireless device scans for beacon frames


War driving


Process of passive discovery of wireless network locations


14


14


Wireless LAN Attacks (cont’d.)


War chalking


Documenting and then advertising location of wireless LANs for others to use


Previously done by drawing on sidewalks or walls around network area


Today, locations are posted on Web sites


Security+ Guide to Network Security Fundamentals, Fourth Edition


15


15


Wireless LAN Attacks (cont’d.)


Evil twin


AP set up by an attacker


Attempts to mimic an authorized AP


Attackers capture transmissions from users to evil twin AP


Some discovery tools available


EvilAP_Defender


Always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.


l


Security+ Guide to Network Security Fundamentals, Fourth Edition


16


16


Combat Attacks - MAC Address Filtering


Method of controlling WLAN access


Limit a device’s access to AP


Media Access Control (MAC) address filtering


Used by nearly all wireless AP vendors


Permits or blocks device based on MAC address


Vulnerabilities of MAC address filtering


Addresses exchanged in unencrypted format


Attacker can see address of approved device and substitute it on his own device


Managing large number of addresses is challenging


Security+ Guide to Network Security Fundamentals, Fourth Edition


17


17


Security+ Guide to Network Security Fundamentals, Fourth Edition


18


Figure 8-7 MAC address filtering


© Cengage Learning 2012


Combat Attacks - MAC Address Filtering


18


Wireless Security Types


Each device must be authenticated prior to connecting to the WLAN


Ranking the current Wi-Fi security methods available on any modern (post-2006) router, ordered from best to worst:


WPA2 + AES


WPA + AES


WPA + TKIP/AES (TKIP is there as a fallback method)


WPA + TKIP


WEP


Open Network (no security at all)


Ideally, you’ll disable Wi-Fi Protected Setup (WPS) and set your router to WPA2 +AES.


Source: HowtoGeek.com


19


19


Wi-Fi Protected Access 2 (cont’d.)


AES encryption and decryption


Should be performed in hardware because of its computationally intensive nature


IEEE 802.1x authentication


Originally developed for wired networks


Provides greater degree of security by implementing port security


Blocks all traffic on a port-by-port basis until client is authenticated


Security+ Guide to Network Security Fundamentals, Fourth Edition


20


20


Other Wireless Security Steps


Antenna placement


Locate near center of coverage area


Place high on a wall to reduce signal obstructions and deter theft


Power level controls


Some APs allow adjustment of the power level at which the LAN transmits


Reducing power allows less signal to reach outsiders


Security+ Guide to Network Security Fundamentals, Fourth Edition


21


21


Other Wireless Security Steps


Organizations are becoming increasingly concerned about existence of rogue APs


Rogue access point discovery tools


Security personnel can manually audit airwaves using wireless protocol analyzer


Continuously monitoring the RF airspace using a wireless probe


Types of wireless probes


Wireless device probe


Desktop probe


Security+ Guide to Network Security Fundamentals, Fourth Edition


22


22


Other Wireless Security Steps


Types of wireless probes (cont’d.)


Access point probe


Dedicated probe


Wireless virtual LANs (VLANs)


Organizations may set up to wireless VLANs


One for employee access, one for guest access


Configured in one of two ways


Depending on which device separates and directs the packets to different networks


Good Read: How to Secure Your Home


Krack here


Review OnGuardOnline.gov


23


23


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact


Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Garcia corporation purchased a truck by issuing an - What is precipitate chemistry - Hire an Online Case Study Writer - Example of a proverb - Which artistic value is least apparent in mannerist paintings - Conners 3 self-report questionnaire - Essential adjective clause examples - What is x cubed minus x - 747 bus timetable aberdeen - Chiquita brands international case study solution - Cephaelis ipecacuanha common name - Singapore healthy living master plan - Two essays about innovation company - How to become an lln specialist - Marketing an introduction edition armstrong and kotler - Estraven and genly ai - Henbury view first school - 2. how has dna sequencing affected the science of classifying organisms? - Discussion Board - Mantissa and exponent questions - Radioactive dating game answers - Leccion 4 contextos activities answers - What does friedman say lincoln's toughest decision was as president - How to create dfd in visio - Threaded 1 - Youngstown state university enrollment - Love stories april morning - Inert sidewinder missile for sale - Nommar model - Managerial Accounting Group Case 2 - Calculating nursing staffing needs - Http www treasurydirect gov indiv tools tools_savingsbondcalc htm - Nursing - Derbyshire county council renew library books - Monteverdi orfeo tu se morta - What is the relationship between elasticity and total revenue - What are market objectives - Mcdougal littell algebra 2 online textbook activation code - Case study week 3 - Discussion - Mt baw baw accomodation - Covid 19 - What technology does mildred use to go to sleep - Parable of sadhu case analysis - University of phoenix psychology - 350 kelvin to fahrenheit - Preparation of benzoic acid from benzonitrile lab report - Java code for printing bill - Potentiometer physics lab - Individual vs family therapy - SRD-ASS 1A - Jelly bean game target - Single word spelling test australia - Selection criteria responses for administration - Please provide a two page (double spaced) preliminary analysis of the company Netflix - POWER POINT - The cdf of a certain college library checkout duration x is as follows. - Week 3 Topics Essay - Locate the centroid of the plane area shown - Roast leg of lamb woolworths - A how do individuals acquire and develop language - Basic unit of dna - What are the names of king lear's daughters - Special schools for slow learners in pune - 2pac ghetto gospel meaning - Foodaholic help - Char chand lagana idiom in english - Revolutionary mothers essay - Physiology - Junk food's popularity relies on marketing ppt - Introduction to computers crossword puzzle answers - Looking for richard techniques - Reflection paper on self assessment - Marketing teacher swot analysis - Schroder uk real estate fund - Warwick computer science modules - Parker posey breakfast club - Which units are used to express sound intensity - Interior of small intestine of fetal pig - Scripps research institute application - Discussion - A wagner matinee symbols - Module 09 Discussion - Brain Death: Ethical Considerations - How does mcdonalds measure employee performance - Which universal intellectual standard is the gateway standard - My marketing lab simulation answers chapter 8 - 5 sps - A 1500 kg car skids to a halt on a wet road where μk = 0.53. - Big brother big business documentary - The concept that as plant output expands, unit costs decrease, is known as: - European humanities - Body recomposition workout plan pdf - So we'll go no more a roving - Not All Companies Are Viewed as Equal - Air expands on heating class 7 - As of december 31, 2017, armani company’s financial records show the following items and amounts. - Inlanguage boutique brunswick east - Looking out looking in 14th edition pdf - Kingdom phylum class order - Isobutyl formate iupac name