Sie sind auf Seite 1von 19

WIRELESS SECURITY

&
FUTURE OF WIRELESS

By
ASHWINI AVABHRAT
(01)
SHWETA DESHPANDE
(10)
WIRELESS SECURITY
INTRODUCTION

Wireless communications offer organizations and users


many benefits such as portability and flexibility, increased
productivity, and lower installation costs.

Perhaps the most significant source of risks in wireless


networks is that the technology’s underlying
communications medium, the airwave, is open to
intruders, making it the logical equivalent of an Ethernet
port in the parking lot.

The loss of confidentiality and integrity and the threat of


denial of service (DoS) attacks are risks typically
associated with wireless communications.

Many organizations poorly administer their wireless


technologies.
Eg :- deploying equipment with “factory default” settings,
failing to control or inventory access points, not
implementing the security capabilities provided, and not
developing or employing a security architecture suitable to
the wireless environment (e.g., one with firewalls between
wired and systems, blocking of unneeded services/ports,
use of strong cryptography).

Most of the risks can be mitigated. However, mitigating


these risks requires considerable tradeoffs between
technical solutions and costs.

The more immediate concerns for wireless communications


are device theft, denial of service, malicious hackers,
malicious code, theft of service, and industrial and foreign
espionage.

Theft is likely to occur with wireless devices because of


Authorized and unauthorized users of the system may
commit fraud and theft. Authorized users are more
likely to carry out such acts since they know what
resources a system has andas well as the system’s
security flaws.

Malicious hackers (crackers) are individuals who break


into a system without authorization, usually for
personal gain or to do harm. Malicious hackers are
generally individuals from outside of an agency or
organization (although users within an agency or
organization can be a threat as well). Such hackers may
gain access to the wireless network access point by
eavesdropping on wireless device communications.

Theft of service occurs when an unauthorized user gains


access to the network and consumes network resources

Industrial and foreign espionage involves gathering


proprietary data from corporations or intelligence
information from governments through eavesdropping.
Security requirements include the following:

Authenticity : A third party must be able to verify that


the content of a message has not been changed in
transit.

Nonrepudiation : The origin or the receipt of a specific


message must be verifiable by a third party.

Accountability : The actions of an entity must be


traceable uniquely to that entity.
Types of unauthorized access to
company networks :-
Accidental Association

Malicious Association

Ad-Hoc Networks

Non-Traditional Networks

Identity Theft (MAC Spoofing)

Man-In-The-Middle Attacks

Denial of Service

Network Injection
Threats in WLAN
Maintaining a secure wireless network and
associated devices requires significant effort,
resources, and vigilance and involves the following
steps:
Maintaining a full understanding of the topology of the
wireless network.

Labeling and keeping inventories of the fielded wireless


and handheld devices.

Creating backups of data frequently.

Performing periodic security testing and assessment of the


wireless network and applying patches and security
enhancements.

Performing ongoing, randomly timed security audits to


monitor and track wireless and handheld devices.

Monitoring the wireless industry for changes to standards


Specific threats and vulnerabilities to wireless
networks and handheld devices include the
following:
All the vulnerabilities that exist in a conventional wired
network apply to wireless technologies.

Malicious entities may gain unauthorized access to an


agency’s computer network through wireless connections,
bypassing any firewall protections.

Sensitive information that is not encrypted or that is poorly


encrypted and that is transmitted between two wireless
devices may be intercepted and disclosed.

DoS attacks may be directed at wireless connections or


devices.

Malicious entities may steal the identity of legitimate users


and masquerade as them on internal or external corporate
networks.
Sensitive data may be corrupted during improper
synchronization.

Malicious entities may be able to violate the privacy of


legitimate users and be able to track their movements.

Viruses or other malicious code may corrupt data on a


wireless device and subsequently be introduced to a wired
network connection.

Malicious entities through wireless connections, connect to


organizations for the purposes of launching attacks and
concealing their activities.

Interlopers, from inside or out, may be able to gain


connectivity to network management controls and thereby
disable or disrupt operations.
Malicious entities may use third-party, untrusted wireless
network services to gain access to an agency’s or other
organization’s network resources.

Internal attacks may be possible via ad hoc transmissions.

Malicious entities may deploy unauthorized equipment


(e.g., client devices and access points) to surreptitiously
gain access to sensitive information.

Handheld devices are easily stolen and can reveal sensitive


information.

Data may be extracted without detection from improperly


configured devices.

Viruses or other malicious code may corrupt data on a


wireless device and be subsequently introduced to a wired
set up that many users simply plug it in and start
using the network without giving much thought to
security.

These are some tips for securing the wireless


network.
Change the default administrative password

Don't broadcast your SSID and Change the default SSID

Enable WPA encryption instead of WEP

Remember that WEP is better than nothing 

Use MAC filtering for access control

Reduce your WLAN transmitter power


• Disable remote administration

• Use strong encryption

• Secure your wireless router or access point


administration interface 

• Turn off the WAP when not in use

• Isolate the wireless network from the rest of the


LAN

• Control the wireless signal

• Transmit on a different frequency


FUTURE OF WIRELESS
INTRODUCTION
Until recently wireless local loops have been used only
where the cost or difficulty of installing wire is
prohibitive.

Modern CDMA equipment makes wireless local loops


practical in developing countries, in rural areas, and
sometimes even for extra lines where wired service is
already provided.

The third generation of personal wireless systems will


feature higher maximum data rates , greater capacity
for voice calls, and the ability to work with a wide range
of cell sizes and types. It may also be somewhat more
standardized than the second generation.

Both CDMA and TDMA systems appear likely to be part


Terrestrial microwave systems at 28GHz are beginning to
be used to deliver television, internet and telephone
services to individual residences. They will probably
supplant an older one-way microwave system.

Many people are expecting that the digitization of


practically all communication systems will lead to a
gradual convergence of systems, but it is doubtful
whether this will actually happen in the near future.

Safety and esthetic concerns could slow the development


of wireless technology.

The future of wireless seems assured, particularly in the


areas of voice and low-speed data. Truly high-speed data
may have to wait for some time for the fourth generation
of wireless.
Many of us firmly believe that wireless technology is to
computing what the PC was to computing back in the
80’s, nothing short of a revolution. On the other hand,
just like many other emerging technologies before it, this
one is not without its share of challenges.

On one side, we have the visionaries, the evangelizers,


preaching the benefits of mobile data access and,
specifically, wireless connectivity. There are more than a
few early adopters, who have successfully mobilized
business applications and are reaping the benefits.

On the other hand there are a few who are not so sure the
promised return on investment is really there, or remain
yet to be convinced that the technology is ready for their
specific enterprise requirements.

One of the problems with the whole wireless and mobility


story is that in many cases technology objectives have
overtaken business objectives.
As a result, wireless and mobility projects have been
implemented without solid planning, business cases,
proper cost/benefit analysis and obviously without
executive management buying into or fully supporting
the project.

Many still think wireless and mobility is about devices


and networks rather than systems integration.

Without executive management support, projects are


soon abandoned or, worse yet, crash and burn, with the
associated casualties and personal embarrassment
making big news.

This situation has hampered the implementation of


wireless and mobility solutions in areas that could have
substantial benefits for corporations, institutions or the
public at large.

Das könnte Ihnen auch gefallen