Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

An attack that sends unsolicited messages to bluetooth-enabled devices

22/12/2020 Client: saad24vbs Deadline: 7 Days

Security+ Guide to Network Security Fundamentals, Fourth Edition


Chapter 8


Wireless Network Security


1


Wireless Network Security


Wireless data communications have revolutionized computer networking


Wireless data networks found virtually everywhere


Wireless networks have been targets for attackers


Early wireless networking standards had vulnerabilities


Changes in wireless network security yielded security comparable to wired networks


Security+ Guide to Network Security Fundamentals, Fourth Edition


2


2


Blue Tooth


Bluetooth ( )


Wireless technology


Uses short-range radio frequency transmissions


Provides for rapid, ad-hoc device pairings


Example: smartphone and Bluetooth headphones, Bose Mini etc


Personal Area Network (PAN) technology


Two types of Bluetooth network topologies


Piconet


Scatternet


Security+ Guide to Network Security Fundamentals, Fourth Edition


3


3


Bluetooth


Piconet


Established when two Bluetooth devices come within range of each other


One device (master) controls all wireless traffic


Other device (slave) takes commands


Active slaves can send transmissions


Parked slaves are connected but not actively participating


4


4


Scatternet


Group of piconets with connections between different piconets


5


Bluetooth


5


Security+ Guide to Network Security Fundamentals, Fourth Edition


6


Bluejacking


Attack that sends unsolicited messages to Bluetooth-enabled devices


Text messages, images, or sounds


Considered more annoying than harmful


No data is stolen


Popular in Europe


Guerilla Marketing


Bluetooth Attacks


6


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


Security+ Guide to Network Security Fundamentals, Fourth Edition


7


7


Wireless Attacks (cont’d.)


Bluesnarfing


Unauthorized access to wireless information through a Bluetooth connection


Often between cell phones and laptops


Attacker copies e-mails, contacts, or other data by connecting to the Bluetooth device without owner’s knowledge


http://www.youtube.com/watch?v=KfZ7Ek409LM


https://www.youtube.com/watch?v=6iIqB-LI1go


All patched years ago


However…


Security+ Guide to Network Security Fundamentals, Fourth Edition


8


8


Wireless Attacks (cont’d.)


Security+ Guide to Network Security Fundamentals, Fourth Edition


9


Good news is that most phones have patches


Next attack surface is Echo, Google Home devices


Patches available also


Best bet, disengage BlueTooth when in public


9


Wireless History


Institute of Electrical and Electronics Engineers (IEEE)


Most influential organization for computer networking and wireless communications


Dates back to 1884


Began developing network architecture standards in the 1980s


1997: release of IEEE 802.11


Standard for wireless local area networks (WLANs)


Higher speeds added in 1999: IEEE 802.11b


Security+ Guide to Network Security Fundamentals, Fourth Edition


10


10


Wireless LAN


IEEE 802.11a


Specifies maximum rated speed of 54Mbps using the 5GHz spectrum


IEEE 802.11g


Preserves stable and widely accepted features of 802.11b


Increases data transfer rates similar to 802.11a


IEEE 802.11n


Ratified in 2009


Speed – up to 300Mbps in real world competing networks


Coverage area – double a, b, g


Security+ Guide to Network Security Fundamentals, Fourth Edition


11


11


Wireless LAN


Access point (AP) major parts


Base Station for wireless network


Antenna and radio transmitter/receiver send and receive wireless signals


Bridging software to interface wireless devices to other devices


Wired network interface allows it to connect by cable to standard wired network


12


12


Wireless LAN Attacks


Wireless broadband routers


Single hardware device containing AP, firewall, router, and DHCP server


Wireless networks have been vulnerable targets for attackers


Not restricted to a cable


Types of wireless LAN attacks


Discovering the network


Attacks through the RF spectrum


Attacks involving access points


Security+ Guide to Network Security Fundamentals, Fourth Edition


13


13


Wireless LAN Attacks (cont’d.)


Discovering the network


One of first steps in attack is to discover presence of a network


Beaconing


AP sends signal at regular intervals to announce its presence and provide connection information


Wireless device scans for beacon frames


War driving


Process of passive discovery of wireless network locations


14


14


Wireless LAN Attacks (cont’d.)


War chalking


Documenting and then advertising location of wireless LANs for others to use


Previously done by drawing on sidewalks or walls around network area


Today, locations are posted on Web sites


Security+ Guide to Network Security Fundamentals, Fourth Edition


15


15


Wireless LAN Attacks (cont’d.)


Evil twin


AP set up by an attacker


Attempts to mimic an authorized AP


Attackers capture transmissions from users to evil twin AP


Some discovery tools available


EvilAP_Defender


Always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.


l


Security+ Guide to Network Security Fundamentals, Fourth Edition


16


16


Combat Attacks - MAC Address Filtering


Method of controlling WLAN access


Limit a device’s access to AP


Media Access Control (MAC) address filtering


Used by nearly all wireless AP vendors


Permits or blocks device based on MAC address


Vulnerabilities of MAC address filtering


Addresses exchanged in unencrypted format


Attacker can see address of approved device and substitute it on his own device


Managing large number of addresses is challenging


Security+ Guide to Network Security Fundamentals, Fourth Edition


17


17


Security+ Guide to Network Security Fundamentals, Fourth Edition


18


Figure 8-7 MAC address filtering


© Cengage Learning 2012


Combat Attacks - MAC Address Filtering


18


Wireless Security Types


Each device must be authenticated prior to connecting to the WLAN


Ranking the current Wi-Fi security methods available on any modern (post-2006) router, ordered from best to worst:


WPA2 + AES


WPA + AES


WPA + TKIP/AES (TKIP is there as a fallback method)


WPA + TKIP


WEP


Open Network (no security at all)


Ideally, you’ll disable Wi-Fi Protected Setup (WPS) and set your router to WPA2 +AES.


Source: HowtoGeek.com


19


19


Wi-Fi Protected Access 2 (cont’d.)


AES encryption and decryption


Should be performed in hardware because of its computationally intensive nature


IEEE 802.1x authentication


Originally developed for wired networks


Provides greater degree of security by implementing port security


Blocks all traffic on a port-by-port basis until client is authenticated


Security+ Guide to Network Security Fundamentals, Fourth Edition


20


20


Other Wireless Security Steps


Antenna placement


Locate near center of coverage area


Place high on a wall to reduce signal obstructions and deter theft


Power level controls


Some APs allow adjustment of the power level at which the LAN transmits


Reducing power allows less signal to reach outsiders


Security+ Guide to Network Security Fundamentals, Fourth Edition


21


21


Other Wireless Security Steps


Organizations are becoming increasingly concerned about existence of rogue APs


Rogue access point discovery tools


Security personnel can manually audit airwaves using wireless protocol analyzer


Continuously monitoring the RF airspace using a wireless probe


Types of wireless probes


Wireless device probe


Desktop probe


Security+ Guide to Network Security Fundamentals, Fourth Edition


22


22


Other Wireless Security Steps


Types of wireless probes (cont’d.)


Access point probe


Dedicated probe


Wireless virtual LANs (VLANs)


Organizations may set up to wireless VLANs


One for employee access, one for guest access


Configured in one of two ways


Depending on which device separates and directs the packets to different networks


Good Read: How to Secure Your Home


Krack here


Review OnGuardOnline.gov


23


23


Applied Sciences

Architecture and Design

Biology

Business & Finance

Chemistry

Computer Science

Geography

Geology

Education

Engineering

English

Environmental science

Spanish

Government

History

Human Resource Management

Information Systems

Law

Literature

Mathematics

Nursing

Physics

Political Science

Psychology

Reading

Science

Social Science

Home

Blog

Archive

Contact


Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Essay Tutor
University Coursework Help
Helping Hand
Writer Writer Name Offer Chat
Top Essay Tutor

ONLINE

Top Essay Tutor

I have more than 12 years of experience in managing online classes, exams, and quizzes on different websites like; Connect, McGraw-Hill, and Blackboard. I always provide a guarantee to my clients for their grades.

$65 Chat With Writer
University Coursework Help

ONLINE

University Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$62 Chat With Writer
Helping Hand

ONLINE

Helping Hand

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$60 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Under armour raw materials - The following information is for bright eyes auto supplies: - Come share this meal john burland - Tata nano marketing strategy pdf - Better world books triple bottom line - Review workplace sustainability policy implementation - Enron who went to jail - Historic civil engineering landmarks - Operating Data Center - Jbhifi change of mind policy - What is cancer? How to prevent and treatment of it? - Itec anatomy and physiology level 3 online course - Best budget tig welder australia - NEED IN 6 HOURS or LESS - The geographical setting and natural features of campania - A la carte revenue model - Think frill la coffer box - Musyokiones change management - The financial industry uses business intelligence to predict hardware failures - Derivative words in english - Costco case study answers - Bent wire fastener crossword clue - Flowchart for simple calculator in python - Confidence Intervals and Hypothesis Testing in Medical Scenarios - Act 2 scene 3 romeo and juliet quotes - Amico pizza lenah valley - In a 5 slide Powerpoint presentation, report on one of these agreements/countries. - Ph of a strong diprotic acid - Brieft Analysis - American dream research paper outline - Ocr nationals ict level 2 - The author to her book by bradstreet - How to calculate molecular weight from rf value - What are centrelink working credits - Discusion - To calculate gdp by the expenditure method one must add - Bus/475 - Btec engineering level 3 assignments answers - Humanity Essay - A fairly subtle approach to advertising is _____. - Elements named after countries - Managing people - ________ are the social ties that radiate outward from the self and link people together. - Artemis fowl discussion questions - Tpg landline phone plans - LEADERSHIP AND CREATIVE SOLUTIONS - Texting is bad for communication skills - Assignment brief example - Social issues in pygmalion - Scion hero character sheet - Masoneilan 41000 series instruction manual - 4 ingredients for photosynthesis - Tmr bridge scour manual - Case Study - What is the nature of related literature and studies - Audit program for accounts receivable - Objects that don't move - Literary analysis happy endings by margaret atwood - PSYCHOLOGY - 4 ASS Kim Woods Only - 125 lexton street lake wendouree - Module 2 Homework - 12 week periodized training program template - Online news stuart allan - Ring out wild bells summary - Animal farm study guide questions answer key - 8 mile rap battle lyrics - Apec study centre rmit - Hr - Annotated bibliography $15 - Charity shopping that circulates goods - Words that start with wh - Mmpi 2 code types ppt - Love vashikaran specialist In kOlkAtA [#+91 9928097710 #]\Top And Best Tantrik Aghori Baba - Any work which has been copied or shared between students will result in a Fail grade for all students concerned. - Mental status checklist - Arc i welding industries - Research Paper - What is the reading v of the voltmeter - How did hongwu stabilize china - Pricing under different market structures - Icao safety oversight manual - Greyhound racing ethical issues - Narrative essay - Japanese tales royall tyler pdf - Daily routine in spanish - Freeman 1984 stakeholder definition - Soap Note Gastroesophageal Reflux - Normal circular pitch in helical gear - Behavior management models - Marketplace live simulation tips quarter 4 - Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger print? - How to write a dialectic essay - Nova absolute zero video worksheet answers - W2. 250 word min for each Essay . due 9/15 - Chc50612 diploma of community services - Refer to figure 11-7. when output level is 100, what is the total cost of production? - Bethesda jazz and blues club menu - Do the analysis of PTU and Hyperthyroidism. - On the run alice goffman sparknotes