Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

An attack that sends unsolicited messages to bluetooth-enabled devices

22/12/2020 Client: saad24vbs Deadline: 7 Days

Security+ Guide to Network Security Fundamentals, Fourth Edition


Chapter 8


Wireless Network Security


1


Wireless Network Security


Wireless data communications have revolutionized computer networking


Wireless data networks found virtually everywhere


Wireless networks have been targets for attackers


Early wireless networking standards had vulnerabilities


Changes in wireless network security yielded security comparable to wired networks


Security+ Guide to Network Security Fundamentals, Fourth Edition


2


2


Blue Tooth


Bluetooth ( )


Wireless technology


Uses short-range radio frequency transmissions


Provides for rapid, ad-hoc device pairings


Example: smartphone and Bluetooth headphones, Bose Mini etc


Personal Area Network (PAN) technology


Two types of Bluetooth network topologies


Piconet


Scatternet


Security+ Guide to Network Security Fundamentals, Fourth Edition


3


3


Bluetooth


Piconet


Established when two Bluetooth devices come within range of each other


One device (master) controls all wireless traffic


Other device (slave) takes commands


Active slaves can send transmissions


Parked slaves are connected but not actively participating


4


4


Scatternet


Group of piconets with connections between different piconets


5


Bluetooth


5


Security+ Guide to Network Security Fundamentals, Fourth Edition


6


Bluejacking


Attack that sends unsolicited messages to Bluetooth-enabled devices


Text messages, images, or sounds


Considered more annoying than harmful


No data is stolen


Popular in Europe


Guerilla Marketing


Bluetooth Attacks


6


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


Security+ Guide to Network Security Fundamentals, Fourth Edition


7


7


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


All patched years ago


However…


Security+ Guide to Network Security Fundamentals, Fourth Edition


8


8


Wireless Attacks (cont’d.)


Security+ Guide to Network Security Fundamentals, Fourth Edition


9


Good news is that most phones have patches


Next attack surface is Echo, Google Home devices


Patches available also


Best bet, disengage BlueTooth when in public


9


Wireless History


Institute of Electrical and Electronics Engineers (IEEE)


Most influential organization for computer networking and wireless communications


Dates back to 1884


Began developing network architecture standards in the 1980s


1997: release of IEEE 802.11


Standard for wireless local area networks (WLANs)


Higher speeds added in 1999: IEEE 802.11b


Security+ Guide to Network Security Fundamentals, Fourth Edition


10


10


Wireless LAN


IEEE 802.11a


Specifies maximum rated speed of 54Mbps using the 5GHz spectrum


IEEE 802.11g


Preserves stable and widely accepted features of 802.11b


Increases data transfer rates similar to 802.11a


IEEE 802.11n


Ratified in 2009


Speed – up to 300Mbps in real world competing networks


Coverage area – double a, b, g


Security+ Guide to Network Security Fundamentals, Fourth Edition


11


11


Wireless LAN


Access point (AP) major parts


Base Station for wireless network


Antenna and radio transmitter/receiver send and receive wireless signals


Bridging software to interface wireless devices to other devices


Wired network interface allows it to connect by cable to standard wired network


12


12


Wireless LAN Attacks


Wireless broadband routers


Single hardware device containing AP, firewall, router, and DHCP server


Wireless networks have been vulnerable targets for attackers


Not restricted to a cable


Types of wireless LAN attacks


Discovering the network


Attacks through the RF spectrum


Attacks involving access points


Security+ Guide to Network Security Fundamentals, Fourth Edition


13


13


Wireless LAN Attacks (cont’d.)


Discovering the network


One of first steps in attack is to discover presence of a network


Beaconing


AP sends signal at regular intervals to announce its presence and provide connection information


Wireless device scans for beacon frames


War driving


Process of passive discovery of wireless network locations


14


14


Wireless LAN Attacks (cont’d.)


War chalking


Documenting and then advertising location of wireless LANs for others to use


Previously done by drawing on sidewalks or walls around network area


Today, locations are posted on Web sites


Security+ Guide to Network Security Fundamentals, Fourth Edition


15


15


Wireless LAN Attacks (cont’d.)


Evil twin


AP set up by an attacker


Attempts to mimic an authorized AP


Attackers capture transmissions from users to evil twin AP


Some discovery tools available


EvilAP_Defender


Always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.


l


Security+ Guide to Network Security Fundamentals, Fourth Edition


16


16


Combat Attacks - MAC Address Filtering


Method of controlling WLAN access


Limit a device’s access to AP


Media Access Control (MAC) address filtering


Used by nearly all wireless AP vendors


Permits or blocks device based on MAC address


Vulnerabilities of MAC address filtering


Addresses exchanged in unencrypted format


Attacker can see address of approved device and substitute it on his own device


Managing large number of addresses is challenging


Security+ Guide to Network Security Fundamentals, Fourth Edition


17


17


Security+ Guide to Network Security Fundamentals, Fourth Edition


18


Figure 8-7 MAC address filtering


© Cengage Learning 2012


Combat Attacks - MAC Address Filtering


18


Wireless Security Types


Each device must be authenticated prior to connecting to the WLAN


Ranking the current Wi-Fi security methods available on any modern (post-2006) router, ordered from best to worst:


WPA2 + AES


WPA + AES


WPA + TKIP/AES (TKIP is there as a fallback method)


WPA + TKIP


WEP


Open Network (no security at all)


Ideally, you’ll disable Wi-Fi Protected Setup (WPS) and set your router to WPA2 +AES.


Source: HowtoGeek.com


19


19


Wi-Fi Protected Access 2 (cont’d.)


AES encryption and decryption


Should be performed in hardware because of its computationally intensive nature


IEEE 802.1x authentication


Originally developed for wired networks


Provides greater degree of security by implementing port security


Blocks all traffic on a port-by-port basis until client is authenticated


Security+ Guide to Network Security Fundamentals, Fourth Edition


20


20


Other Wireless Security Steps


Antenna placement


Locate near center of coverage area


Place high on a wall to reduce signal obstructions and deter theft


Power level controls


Some APs allow adjustment of the power level at which the LAN transmits


Reducing power allows less signal to reach outsiders


Security+ Guide to Network Security Fundamentals, Fourth Edition


21


21


Other Wireless Security Steps


Organizations are becoming increasingly concerned about existence of rogue APs


Rogue access point discovery tools


Security personnel can manually audit airwaves using wireless protocol analyzer


Continuously monitoring the RF airspace using a wireless probe


Types of wireless probes


Wireless device probe


Desktop probe


Security+ Guide to Network Security Fundamentals, Fourth Edition


22


22


Other Wireless Security Steps


Types of wireless probes (cont’d.)


Access point probe


Dedicated probe


Wireless virtual LANs (VLANs)


Organizations may set up to wireless VLANs


One for employee access, one for guest access


Configured in one of two ways


Depending on which device separates and directs the packets to different networks


Good Read: How to Secure Your Home


Krack here


Review OnGuardOnline.gov


23


23


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact


Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

W9 - Legal studies practice exams - Discussion Post Nursing - Plant chromatography lab answers - Cmit 350 cisco network proposal part 2 - Bd white birch investment llc - 11a queen street balcolyn - Under armour annual report 2016 pdf - Nether green infant school - Barefoot moneymovement org au - Anglia ruskin e mail - What was robinson's purpose for writing to the mayor - Business research management - Sparknotes nickel and dimed chapter 1 - Data is sent through the network in bundles called - Seaside marina accounting practice set answers - Bankers algorithm program in c - Media ethics issues and cases - Periodic table children's book project - Hyatt regency hotel disaster - Powerpoint - The anthem of doomed youth - Dayman motors nelson nz - 1/34 royal avenue essendon north - Freak the mighty chapter 18 summary - Melbourne solar system trail - Oxidation reduction reactions lab answers - The effective human service professional - St matthews hospital northampton - Why are so many familiar industries oligopolies - The postmortal drew magary pdf - La familia worksheet answers - What is a test tube used for - Hockley valley brewing co inc case study - Sheep brain dissection worksheet - A child called it quotes with page number - Apply: Regression, Use the data to construct a model, Construct a multiple regression model. - Squirrel tree services statement of cash flows - The ledger of mai company includes the following accounts - Conservation of mass experiment - Estimating unpaid claims using basic techniques - Interdisciplinary theory nursing - Guess the sweet quiz - How much is a nolan ryan rookie card worth - The Role of the RN/APRN in Policy Evaluation - 182-182 bsb which branch - Kiosk manager duties and responsibilities - Andrew jackson quotes about indian removal - Till he unseamed him from the nave to the chaps - In terms of globally integrated marketing communications adaptation is - Game of thrones hoodie south africa - LaRica, 4 pages due by 24 hours!! - Wee jasper general store - In sickness and in wealth movie - 2 Questions - Restaurant industry average return on equity - Quartz sandstone is changed during metamorphism into - Literature review microsoft word - The thinker's guide to the art of socratic questioning pdf - Amazon debt to equity ratio 2016 - Spontaneous communitas abolishes status. - Stephen symonds foster the brotherhood of thieves - Chapter 12 review and assessment answers - Difference between bleve and vce - Air lock in tap - Nursing Teaching - 5 Sentece thesis Statement - Conformity and conflict readings in cultural anthropology 15th edition pdf - North central and east london foundation school - The academic writing reader saint leo university - Case Management Process Section 5: Terminating the Case - Just prior to awakening chinua from a hypnotic state - HELP - Nursing and health (24 hours) - Margaret Huebner: Building the Human Resources Function at Oman’s Port of Salalah - What best describes the rightness or wrongness of plagiarism - A Case Analysis of Uber - International human resource management book pdf - Need help with attached. - Mcdonald's kwinana freeway northbound - Marketing - Radio lobo wichita ks el mercadito - Electric field of a quadrupole - St johns river shipyards welding machine is 15 years old - Evaluate the role of frugal innovation in an organisational context - Mole road map worksheet - Circuit breaker ka rating - Ward 7d royal north shore hospital - NEED ASAP, PSYCH SEMINAR - Biology chapter 7 section 2 answers - Space gass truss analysis - MidJourney Free: Discover the Power of AI-Generated Art at No Cost - Animal farm chapter 1 4 questions and answers - Population and sample quiz - Stock order book viewer - Book week ideas for schools - The island of sodor - Stoichiometry of a precipitation reaction lab - Cyclone hollanda ile maurice - Blood test abbreviations euc