Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

An attack that sends unsolicited messages to bluetooth-enabled devices

22/12/2020 Client: saad24vbs Deadline: 7 Days

Security+ Guide to Network Security Fundamentals, Fourth Edition


Chapter 8


Wireless Network Security


1


Wireless Network Security


Wireless data communications have revolutionized computer networking


Wireless data networks found virtually everywhere


Wireless networks have been targets for attackers


Early wireless networking standards had vulnerabilities


Changes in wireless network security yielded security comparable to wired networks


Security+ Guide to Network Security Fundamentals, Fourth Edition


2


2


Blue Tooth


Bluetooth ( )


Wireless technology


Uses short-range radio frequency transmissions


Provides for rapid, ad-hoc device pairings


Example: smartphone and Bluetooth headphones, Bose Mini etc


Personal Area Network (PAN) technology


Two types of Bluetooth network topologies


Piconet


Scatternet


Security+ Guide to Network Security Fundamentals, Fourth Edition


3


3


Bluetooth


Piconet


Established when two Bluetooth devices come within range of each other


One device (master) controls all wireless traffic


Other device (slave) takes commands


Active slaves can send transmissions


Parked slaves are connected but not actively participating


4


4


Scatternet


Group of piconets with connections between different piconets


5


Bluetooth


5


Security+ Guide to Network Security Fundamentals, Fourth Edition


6


Bluejacking


Attack that sends unsolicited messages to Bluetooth-enabled devices


Text messages, images, or sounds


Considered more annoying than harmful


No data is stolen


Popular in Europe


Guerilla Marketing


Bluetooth Attacks


6


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


Security+ Guide to Network Security Fundamentals, Fourth Edition


7


7


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


All patched years ago


However…


Security+ Guide to Network Security Fundamentals, Fourth Edition


8


8


Wireless Attacks (cont’d.)


Security+ Guide to Network Security Fundamentals, Fourth Edition


9


Good news is that most phones have patches


Next attack surface is Echo, Google Home devices


Patches available also


Best bet, disengage BlueTooth when in public


9


Wireless History


Institute of Electrical and Electronics Engineers (IEEE)


Most influential organization for computer networking and wireless communications


Dates back to 1884


Began developing network architecture standards in the 1980s


1997: release of IEEE 802.11


Standard for wireless local area networks (WLANs)


Higher speeds added in 1999: IEEE 802.11b


Security+ Guide to Network Security Fundamentals, Fourth Edition


10


10


Wireless LAN


IEEE 802.11a


Specifies maximum rated speed of 54Mbps using the 5GHz spectrum


IEEE 802.11g


Preserves stable and widely accepted features of 802.11b


Increases data transfer rates similar to 802.11a


IEEE 802.11n


Ratified in 2009


Speed – up to 300Mbps in real world competing networks


Coverage area – double a, b, g


Security+ Guide to Network Security Fundamentals, Fourth Edition


11


11


Wireless LAN


Access point (AP) major parts


Base Station for wireless network


Antenna and radio transmitter/receiver send and receive wireless signals


Bridging software to interface wireless devices to other devices


Wired network interface allows it to connect by cable to standard wired network


12


12


Wireless LAN Attacks


Wireless broadband routers


Single hardware device containing AP, firewall, router, and DHCP server


Wireless networks have been vulnerable targets for attackers


Not restricted to a cable


Types of wireless LAN attacks


Discovering the network


Attacks through the RF spectrum


Attacks involving access points


Security+ Guide to Network Security Fundamentals, Fourth Edition


13


13


Wireless LAN Attacks (cont’d.)


Discovering the network


One of first steps in attack is to discover presence of a network


Beaconing


AP sends signal at regular intervals to announce its presence and provide connection information


Wireless device scans for beacon frames


War driving


Process of passive discovery of wireless network locations


14


14


Wireless LAN Attacks (cont’d.)


War chalking


Documenting and then advertising location of wireless LANs for others to use


Previously done by drawing on sidewalks or walls around network area


Today, locations are posted on Web sites


Security+ Guide to Network Security Fundamentals, Fourth Edition


15


15


Wireless LAN Attacks (cont’d.)


Evil twin


AP set up by an attacker


Attempts to mimic an authorized AP


Attackers capture transmissions from users to evil twin AP


Some discovery tools available


EvilAP_Defender


Always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.


l


Security+ Guide to Network Security Fundamentals, Fourth Edition


16


16


Combat Attacks - MAC Address Filtering


Method of controlling WLAN access


Limit a device’s access to AP


Media Access Control (MAC) address filtering


Used by nearly all wireless AP vendors


Permits or blocks device based on MAC address


Vulnerabilities of MAC address filtering


Addresses exchanged in unencrypted format


Attacker can see address of approved device and substitute it on his own device


Managing large number of addresses is challenging


Security+ Guide to Network Security Fundamentals, Fourth Edition


17


17


Security+ Guide to Network Security Fundamentals, Fourth Edition


18


Figure 8-7 MAC address filtering


© Cengage Learning 2012


Combat Attacks - MAC Address Filtering


18


Wireless Security Types


Each device must be authenticated prior to connecting to the WLAN


Ranking the current Wi-Fi security methods available on any modern (post-2006) router, ordered from best to worst:


WPA2 + AES


WPA + AES


WPA + TKIP/AES (TKIP is there as a fallback method)


WPA + TKIP


WEP


Open Network (no security at all)


Ideally, you’ll disable Wi-Fi Protected Setup (WPS) and set your router to WPA2 +AES.


Source: HowtoGeek.com


19


19


Wi-Fi Protected Access 2 (cont’d.)


AES encryption and decryption


Should be performed in hardware because of its computationally intensive nature


IEEE 802.1x authentication


Originally developed for wired networks


Provides greater degree of security by implementing port security


Blocks all traffic on a port-by-port basis until client is authenticated


Security+ Guide to Network Security Fundamentals, Fourth Edition


20


20


Other Wireless Security Steps


Antenna placement


Locate near center of coverage area


Place high on a wall to reduce signal obstructions and deter theft


Power level controls


Some APs allow adjustment of the power level at which the LAN transmits


Reducing power allows less signal to reach outsiders


Security+ Guide to Network Security Fundamentals, Fourth Edition


21


21


Other Wireless Security Steps


Organizations are becoming increasingly concerned about existence of rogue APs


Rogue access point discovery tools


Security personnel can manually audit airwaves using wireless protocol analyzer


Continuously monitoring the RF airspace using a wireless probe


Types of wireless probes


Wireless device probe


Desktop probe


Security+ Guide to Network Security Fundamentals, Fourth Edition


22


22


Other Wireless Security Steps


Types of wireless probes (cont’d.)


Access point probe


Dedicated probe


Wireless virtual LANs (VLANs)


Organizations may set up to wireless VLANs


One for employee access, one for guest access


Configured in one of two ways


Depending on which device separates and directs the packets to different networks


Good Read: How to Secure Your Home


Krack here


Review OnGuardOnline.gov


23


23


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact


Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Journal Article Summaries - Anno 2205 trench coat chest location - Salukinet d2l - Veeder root tls 2 - First Draft of a Rhetorical Analysis - How do fraction strips help - Sso roles and responsibilities - Why our screens make us less happy ted talk - Sea ray v drive problems - Wsj college football grid of shame - Unchained our family's addiction mess is our message - Ccea gce biology past papers - Application Assignment - Analysis of copper in a brass sample - The Five Federal Laws and the Human Service Movement - Operational definition of customer satisfaction - How to write a critical evaluation - What is a critical thinking assignment - Humanistic and existential personality theories - Mobile wap internet sessions telstra - Joyce mayne warehouse kawana - Spss descriptive statistics syntax - Power point - Https www youtube com watch v i47y6vhc3ms - Bayer urine test strips color chart - 0.054 as a percent - Can employers regulate workplace romance lifetime fitness - Individual health history and examination assignment resource - The motion of billiard ball is motion - APA nursing assignment - Three beads are placed along a thin rod - Artist booking contract pdf - Tesco call centre dundee - Policy - Project Management- Reflection & Discussion- Week 15 - Wireshark lab dns v7 0 solution - Is movicol low fodmap - Grantham university class action lawsuit - Developing person through childhood and adolescence 11th edition pdf - Harmony 650 firmware download - Insights Into Criminal Behavior - Great expectations study guide chapters 1 10 answers - ASP SOFTWARE - Mth 221 discrete math for information technology - Victoria river downs station - Internal alignment meaning - Glb Ethics - Project Interactive Personal Blogging - Dell distribution and supply chain innovation - At the first psychological clinic the patients were primarily - Dancing in the moonlight string quartet - Parallax lab answers - Institute of fire engineers exams - Ten commandments coptic orthodox - Explorers webquest 4th grade - Minimum time an nhs fire door will contain fire - Hypa transition to work - The method listfiles filenamefilter is ambiguous for the type file - Depth of field biology - African American List - Econ 312 week 2 quiz - Conversion of tert butyl bromide to tert butyl alcohol - International business aviation council - Nursing capstone - Reconciliation action plan template - All of the following are analytic functionalities that bi systems deliver except: - Synopsis summary - Partial fraction of 1 s 1 2 - Reply 2 different discussions - How to respond to a case study in apa format - Aqa gcse french complex structures - Gender - Moral corruption in the great gatsby quotes - Lord i need you chords - Quality of nursing care theory by june larrabee - Who wants to be a millionaire question template - You are the network administrator for westsim.com - The four agreements lesson plan - Acca colleges in ahmedabad - Etrm oracle apps 11i - New mathematics could neutralize pathogens that resist antibiotics sat answers - Biomerieux api 20e manual - Why choose endoscopy nursing - Cie a level maths syllabus - Random errors in experiments - Hsbc bank in bangladesh - Adding and subtracting integers test - Ecampus phoenix edu classroom ic classroom aspx - A compressed cylinder of gas contains - Discussion board - Marketing design brief template - Cell defense worksheet answers - Network security proposal part 2 - Daedalus and icarus questions and answers - Ikea printed electronics open innovation challenges - Maurice j gallagher jr - Martha mccaskey case study - Progress notes - Properties of addition subtraction multiplication and division - Intervention Support Plan