SlideShare uma empresa Scribd logo
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security
TJX Data Breach ,[object Object],[object Object],[object Object],[object Object]
Objectives ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11 Wireless Security Protections
Institute of Electrical and Electronics Engineers (IEEE) ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11 WLAN Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access to a WLAN ,[object Object],[object Object],[object Object],[object Object],[object Object]
Controlling Access
MAC Address Filtering
MAC Address Filtering ,[object Object],[object Object],[object Object]
Wired Equivalent Privacy (WEP) ,[object Object],[object Object],[object Object],[object Object],Security+ Guide to Network Security Fundamentals, Third Edition
WEP Keys ,[object Object],[object Object],[object Object]
 
WEP Encryption Process
Transmitting with WEP
Device Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Vulnerabilities of IEEE 802.11 Security Open system authentication MAC address filtering WEP
Open System Authentication ,[object Object],[object Object],[object Object],[object Object]
Turning Off Beaconing ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
MAC Address Filtering Weaknesses ,[object Object],[object Object],[object Object],[object Object],[object Object]
WEP ,[object Object],[object Object],[object Object],[object Object]
Cracking WEP ,[object Object],[object Object],[object Object]
Personal Wireless Security ,[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object]
WPA Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Temporal Key Integrity Protocol (TKIP) ,[object Object],[object Object],[object Object],[object Object]
Message Integrity Check (MIC) ,[object Object],[object Object],[object Object]
WPA2 Personal Security ,[object Object],[object Object],[object Object],[object Object],[object Object]
WPA2 Personal Security ,[object Object],[object Object],[object Object]
PSK Key Management Weaknesses ,[object Object],[object Object],[object Object],[object Object]
Pre-Shared Key Weakness ,[object Object],[object Object],[object Object],[object Object]
Cracking WPA
WPA2 Personal Security (continued) ,[object Object],[object Object],[object Object]
WPA and WPA2 Compared
Enterprise Wireless Security Two models: IEEE 802.11i  WPA and WPA2 models
IEEE 802.11i ,[object Object],[object Object],[object Object],[object Object]
IEEE 802.11i ,[object Object]
802.1x Authentication
IEEE 802.11i (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object]
WPA Enterprise Security ,[object Object],[object Object],[object Object]
WPA Enterprise Security (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WPA2 Enterprise Security ,[object Object],[object Object],[object Object]
Enterprise and Personal Wireless Security Models
Enterprise Wireless Security Devices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Wireless Security Devices (continued)
Enterprise Wireless Security Devices (continued) ,[object Object],[object Object],[object Object]
 
 
Enterprise Wireless Security Devices (continued) ,[object Object],[object Object],[object Object]
Rogue Access Point Discovery Tools ,[object Object],[object Object],[object Object]
Types of Wireless Probes ,[object Object],[object Object],[object Object],[object Object]
 

Mais conteúdo relacionado

Mais procurados

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
Ismail Mukiibi
 

Mais procurados (20)

IP Security
IP SecurityIP Security
IP Security
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Network Security ppt
Network Security pptNetwork Security ppt
Network Security ppt
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
VPN
VPNVPN
VPN
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
Network security
Network securityNetwork security
Network security
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
WPA2
WPA2WPA2
WPA2
 
AAA server
AAA serverAAA server
AAA server
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Semelhante a Ch06 Wireless Network Security

4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
Rama Krishna M
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 

Semelhante a Ch06 Wireless Network Security (20)

Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
5169 wireless network_security_amine_k
5169 wireless network_security_amine_k5169 wireless network_security_amine_k
5169 wireless network_security_amine_k
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wi Fi Technology
Wi Fi TechnologyWi Fi Technology
Wi Fi Technology
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijay
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 
DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Security Issues of IEEE 802.11b
Security Issues of IEEE 802.11bSecurity Issues of IEEE 802.11b
Security Issues of IEEE 802.11b
 
Security Issues of 802.11b
Security Issues of 802.11bSecurity Issues of 802.11b
Security Issues of 802.11b
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Hacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh JadonHacking Wireless Networks by Mandeep Singh Jadon
Hacking Wireless Networks by Mandeep Singh Jadon
 

Mais de Information Technology (20)

Web303
Web303Web303
Web303
 
Sql Server Security Best Practices
Sql Server Security Best PracticesSql Server Security Best Practices
Sql Server Security Best Practices
 
SAN
SANSAN
SAN
 
SAN Review
SAN ReviewSAN Review
SAN Review
 
SQL 2005 Disk IO Performance
SQL 2005 Disk IO PerformanceSQL 2005 Disk IO Performance
SQL 2005 Disk IO Performance
 
RAID Review
RAID ReviewRAID Review
RAID Review
 
Review of SQL
Review of SQLReview of SQL
Review of SQL
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
IIS 7: The Administrator’s Guide
IIS 7: The Administrator’s GuideIIS 7: The Administrator’s Guide
IIS 7: The Administrator’s Guide
 
MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2MOSS 2007 Deployment Fundamentals -Part2
MOSS 2007 Deployment Fundamentals -Part2
 
MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1MOSS 2007 Deployment Fundamentals -Part1
MOSS 2007 Deployment Fundamentals -Part1
 
Clustering and High Availability
Clustering and High Availability Clustering and High Availability
Clustering and High Availability
 
F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)F5 beyond load balancer (nov 2009)
F5 beyond load balancer (nov 2009)
 
WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007WSS 3.0 & SharePoint 2007
WSS 3.0 & SharePoint 2007
 
SharePoint Topology
SharePoint Topology SharePoint Topology
SharePoint Topology
 
Sharepoint Deployments
Sharepoint DeploymentsSharepoint Deployments
Sharepoint Deployments
 
Microsoft Clustering
Microsoft ClusteringMicrosoft Clustering
Microsoft Clustering
 
Scalable Internet Servers and Load Balancing
Scalable Internet Servers and Load BalancingScalable Internet Servers and Load Balancing
Scalable Internet Servers and Load Balancing
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Migration from ASP to ASP.NET
Migration from ASP to ASP.NETMigration from ASP to ASP.NET
Migration from ASP to ASP.NET
 

Último

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
SaadHumayun7
 

Último (20)

Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Advances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdfAdvances in production technology of Grapes.pdf
Advances in production technology of Grapes.pdf
 
The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...The impact of social media on mental health and well-being has been a topic o...
The impact of social media on mental health and well-being has been a topic o...
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
Removal Strategy _ FEFO _ Working with Perishable Products in Odoo 17
 

Ch06 Wireless Network Security