Beruflich Dokumente
Kultur Dokumente
most likely candidate to become widely prevalent in corporate environments. Current 802.11b products operate at 2.4GHz, and deliver up to 11Mbps of bandwidth An upcoming version called 802.11a moves to a higher frequency range, and promises significantly faster speeds. This provides low cost, combined with strong performance and ease of deployment Many departments and individuals already use 802.11b, at home or at work But security management administrators do not yet
Over the past few years, wired LANs have lost their
In Wiring LANs, the roving users can be in direct Similarly, situation in which people have to move Wireless LANs can also move to higher power
around to various locations to perform their work are candidates for wireless LANs. plateaus, which will extend their distances from hundreds of feet to several tens of thousands of feet. two-way contact with the full resources of the enterprises information systems.
In wireless LANs the users or clients access the data The data is to be transferred in the form of
1.SPREAD SPECTRUM TECHNIQUE
Most wireless LAN systems use spread-spectrum technology
It provides secure , reliable and efficient.
or information from the server through the Access Point. Microwaves or Spread Spectrum or Infrared technique.
2. INFRARED TECHNOLOGY
3.MICROWAVE TECHNOLOGY
Microwave WLANs use the frequencies in the 18 GHz to 24 GHz Long distance microwave towers can send their waves to
around 30 miles, depending upon the size of the tower.
range to encapsulate and transfer the LAN data packets .
1. ONE - TO - ONE OPERATIONS 2. ONE -TO - MANY OPERATIONS 3. MANY - TO - MANY OPERATIONS
Healthcare
The WLAN technology can help healthcare professionals such as: 1. Keep patient records current and accessible. 2. Maintain network connectivity for mobile, roaming staff. 3.Link departmental wired LANs in separate buildings to central facilities.
Education
WLAN can help educators and administrators meet a variety of education such as: 1.Low-cost campus area networks for access to local and
Internet services.
Offices
With WLAN, people can done their work done and make the office infrastructure more efficient such as: 1.Reliable connectivity for individual workers and whole workgroups to networked applications and data from any office location. 2.Sales and services persons spend almost all their time out of the office. It is possible to connect them with officers.
WLAN threats 1- Unstructured threats : - It happened by hackers who arent technical , they use
simple tools to steal the passwords.
2- Structured threats: It happened by hackers who are more technical - They can know the network vulnerabilities then they can provide a script or a code or a program to use it in accessing to the network. 3- External threats: - It may be happened by a person or organized group from the outside of the network , they arent authorized to access to the network. 4- Internal threats : - It happened by a person who has the permission and authorized to access to the network from the internal employees , he can damage the network.
Spy To gather information isnt allowed to be known Access - Unauthorized person access to the network ( doesnt have
any account ), he can access by guessing the password or he know that the password is weak.
DOS (Denial Of Service) - Disable or corrupts wireless network. - The more danger and is difficult to prevent.
1-Provide a process to audit existing wireless security. 2- Provide a general frame work for implementing security. 3- Define behavior that is allowed and that isnt allowed . 4- Help determine which tools are needed for the
organization.
6- Define a process for handling wireless breaches. 7- Create a basic for legal action
The following steps occur when two devices use Open System
Authentication:
The station sends an authentication request to the access point. The access point authenticates the station. The station associates with the access point and joins the network.
Require the client and the access point to have the same WEP
key.
If client has the wrong key or no key , it will fail (client fail)
- WEP ( Wired Equivalent Privacy ) - IEEE 802.11 standard include WEP ( Wired Equivalent Privacy ) to
protect authorized user of WLAN from attack .
It Is a technology which encrypt the traffic on your network. When using WEP , both the wireless client and the access point must
have a matching WEP key.
WEP keys : First scheme : Set of up to four default key are shared by all station , so
when the keys are distributed over the stations , it is easy to be known by unauthorized person .
Second scheme : Each client establish a key mapping relationship with other station. This is more secure
WPA has two modes : 1- Personal : For small installation ( single password). 2- Enterprise :
For large installation ( username , password).
End- to End Encryption Mean that all conversation is encrypted from your PC to the service
or the station you talking to.
WLAN is widely used in various corporates and can be made secured and reliable by using various security techniques available.