SlideShare a Scribd company logo
1 of 42
Security at Device, Network & Server Levels QIP Short Term Course On Wireless  Security Chetan Kumar Shivakumar Protocol Engineering and Technology Unit, IISc. (Currently working at Alcatel Lucent India Limited) e-mail shivakumar.chetan@gmail.com
Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Session 1 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Security specifics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Need for Mobile Device Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Important Data on mobile device ,[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile device security Threat ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile device security Threat ,[object Object],[object Object],[object Object]
Environmental Threats ,[object Object],[object Object],[object Object],[object Object],[object Object]
Few solutions for device security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policy enforced solutions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
OS Security Mechanism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Level Security
Why do we need network security I can send mail to all news channels using wifi access from this building. No non-repudiation
Why do we need network security I can get the passwords now sitting outside this building Internet Banking is so easy with WiFi at home Eves dropping
Why security is more of a concern in wireless ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why security is more of a concern in wireless ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why security is more of a concern in wireless ? ,[object Object],[object Object]
Network Level Security Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LAN Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Service Set Identifier (SSID) ‏ ,[object Object],[object Object],[object Object],[object Object]
MAC Address Filtering ,[object Object],[object Object],[object Object],[object Object],[object Object]
Issues with MAC Address Filtering ,[object Object],[object Object],[object Object]
End of session 1 ,[object Object]
Session 2 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP - Wired Equivalent privacy ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is WPA? ,[object Object],[object Object]
WPA in nut shell… ,[object Object],[object Object],[object Object],[object Object]
WPA in nut shell… ( Cont’d ) ‏ ,[object Object],[object Object],[object Object],[object Object]
WPA Modes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In Summary ,[object Object],[object Object],[object Object]
AdHoc Network Security issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Server Level Security ,[object Object],[object Object],[object Object]
Security Threats in Servers ,[object Object],[object Object],[object Object],[object Object]
Securing the Servers ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank You ,[object Object],[object Object]
Backup Slide ,[object Object]

More Related Content

What's hot

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
Ahmed Nour
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally
 

What's hot (20)

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
wifi aware
 wifi aware wifi aware
wifi aware
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
secure file Storage on cloud ppt
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud ppt
 
WPA2
WPA2WPA2
WPA2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Wpa3
Wpa3Wpa3
Wpa3
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Wireless security
Wireless securityWireless security
Wireless security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
WPA 3
WPA 3WPA 3
WPA 3
 

Viewers also liked

Radio waves presentation
Radio waves presentationRadio waves presentation
Radio waves presentation
04burkem
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
mrtheodisthorne2
 

Viewers also liked (16)

Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Information Security
Information SecurityInformation Security
Information Security
 
network security, cryptography,steganography
network security, cryptography,steganographynetwork security, cryptography,steganography
network security, cryptography,steganography
 
Slideshire
SlideshireSlideshire
Slideshire
 
Radio waves presentation
Radio waves presentationRadio waves presentation
Radio waves presentation
 
Radio waves
Radio wavesRadio waves
Radio waves
 
Radio waves ppt
Radio waves pptRadio waves ppt
Radio waves ppt
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Radio Waves
Radio WavesRadio Waves
Radio Waves
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Radio waves presentation
Radio waves presentationRadio waves presentation
Radio waves presentation
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Wireless Network Presentation
Wireless Network PresentationWireless Network Presentation
Wireless Network Presentation
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar to Wireless Device and Network level security

Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
謝續平
謝續平謝續平
謝續平
9577601
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
Marynol Cahinde
 

Similar to Wireless Device and Network level security (20)

Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Wireless security by mujajhid rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
謝續平
謝續平謝續平
謝續平
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 

More from Chetan Kumar S

Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
Chetan Kumar S
 

More from Chetan Kumar S (9)

Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Human Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise ApplicationsHuman Machine Interface for Enterprise Applications
Human Machine Interface for Enterprise Applications
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
 
Computational Intelligence and Applications
Computational Intelligence and ApplicationsComputational Intelligence and Applications
Computational Intelligence and Applications
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
blockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challangesblockchain and iot: Opportunities and Challanges
blockchain and iot: Opportunities and Challanges
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 

Wireless Device and Network level security

  • 1. Security at Device, Network & Server Levels QIP Short Term Course On Wireless  Security Chetan Kumar Shivakumar Protocol Engineering and Technology Unit, IISc. (Currently working at Alcatel Lucent India Limited) e-mail shivakumar.chetan@gmail.com
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17. Why do we need network security I can send mail to all news channels using wifi access from this building. No non-repudiation
  • 18. Why do we need network security I can get the passwords now sitting outside this building Internet Banking is so easy with WiFi at home Eves dropping
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.