We should ensure that data is encrypted in the wireless medium as it's easy for someone
to sniff the traffic to get some sensitive data so it's a harder medium to be more secure
but, a very important thing to consider.
Wireless Security Standards
ceaser cipher : every character is replaced with the character 3 positions before.
Encryption Methods:
1. WEP
Wire Equivalent privacy Protocol(IEEE 802.11 standard)
- Encryption: RC-4 algorithm
- key length= 104 bit
- static key
2. WPA
WIFI Protected Access
- was a trial to solve WEP issues
Encryption: RC-4 algorithm
key PSK Pre-Shared key
Data integrity: TKIP (temporal key integrity protocol) ensures that no attacker changed packets crossed from AP to the client.
key changes with every packet
WEP + WPA = same HW
3. WPA2
(Strongest)
Encryption: AES (Advanced Encryption Standard) requires more CPU
key PSK Pre-Shared key
Data integrity: CCMP (Counter Cipher Mode Protocol) more secure and harder to break.
Wireless Threats and Attacks
Eavesdropping (Sniffing)
- Using any packet sniffer tool any attack can sniff your wireless traffic searching for sensitive data.
- As a security admin you should do "auditing traffic" to hide sensitive data before being known by the attacker
Spoofing (masquerading)
- Changing identity by (changing mac/IP addresses) (using applications) (know network password)
Denial of Service (DoS)
prevent authorized users from accessing network, resource using radio signals - using vulnerability (default settings) solution: latest firmware - response strategy - non-default setting
Rogue Access Point
AP is working in the network without knowing the security admin about it, and may be put in by some users for some good coverage or by attackers to do bad stuff. dangerously is represented in 2 no password no encryption so it's for the attacker to do whatever he wants solution : IDS + scanning
Wireless Design Considerations
Wireless Signal
covered well (strong signal )in the building and under control + no signal outside the company building.
Access point security
- SSID is hidden
- Access point filtering like ACL
write what you want to permit or deny
permit or deny - src mac - src IP - src port - dest mac - dest IP dest port - Encryption WPA2 (which uses AES cipher)
separates between wireless and wired network
-Putting a firewall to determine whether traffic can access from/to the wired section.