RAM_SecurityPPT

download report

Transcript RAM_SecurityPPT

Security of the Network
Wireless Security Risks
• Why is it easy to hack a wireless network?
• How to detect and hack a wireless network?
• What do successful hackers do?
• Network Intrusion Detection and Protection.
Why is it easy to hack a wireless
network?
• There is no physical boundary to a wireless
network.
• Due to bugs in the protocol implementation
used for wireless networks.
How to detect and hack a wireless
network?
• War Driving
• Rogue Access Point
• WEP Key Cracking
What do successful hackers do?
• Active Hackers Risks
• Confidentiality
• Integrity
• Availability
• Passive Hackers
• Interested in data
• Don’t harm the network
Network Intrusion Detection and
Protection
• Network based
• Packet Sniffers
• Signature Detectors
• Host based
• Use of Honey Pots (sand box)
• Use of Firewalls/NAT/VPN
Secure WLAN Architecture
•
•
•
•
Protocol Introduction
Security Model
Architecture of the proposed system
Drawbacks of the model
Protocol Introduction
• We use VPN/IPSec/TKIP Protocols
Security Model
• Contains two phases
1. Designing and implementing a secure system
2. Educating the users about security
Architecture description
•
•
•
•
Mac-address filtering
Password based security
Assignment of client IP addresses
Use of VPN/Firewall
Architecture Diagram
Authorize id
LAN Switch
INTERNET
Authorized?
NO!
Check
YES
ID/Pass
Authorized?
ID/Pass??
I’m MAC X
Private N/W
I am MAC Y
STUDENT
ID/Pass
STAFF
END