Chapter 7: Wireless Network Security Flashcards
Wireless Network Security
What are some security concerns with wireless networks?
- Channel: wireless networks typically involves broadcast communications which is more susceptible to eavesdropping and jamming. Active attacks that exploit vulnerabilities in communications protocols.
- Mobility: wireless devices are more portable and mobile
- Resources: wireless devices have sophisticated OS but limited memory and processing resources that can counter threats.
- Accessibility: wireless devices may be left unattended, increases vulnerability to physical attacks.
What are some wireless network security threats?
- Accidental association: Wireless LANS in close proximity may create overlapping transmission ranges resulting in users accidentally connecting to the wrong LAN.
- Malicious association: wireless device configured to appear legitimate, that enables the stealing of user credentials.
- Ad hoc networks: peer-to-peer networks between wireless computers with no access point in between. Security threat due to a lack of a central point of control.
- Nontraditional networks: i.e. barcode readers or PDAs, pose a security risk in terms of eavesdropping and spoofing.
- ID theft (MAC spoofing): eavesdropping to identify the MAC address of a computer with network privileges.
- MITM
- DoS
- Network Injection
What are the principal threats to wireless transmission and what two types of countermeasures are appropriate?
Threat: eavesdropping, alteration/insertion of messages, disruption.
Signal-hiding: make it more difficult to locate the wireless access point. Turning off service set identifier (SSID) broadcasting by wireless access points: cryptic names to SSID, reduce signal strength, placing access points away from windows and exterior walls, directional antennas, signal-shielding techniques.
Encryption
What are the principal threats to wireless access points and what types of countermeasures are appropriate?
Threats: unauthorised access.
IEEE 802.1X standard for port-based network access control.
Countermeasures:
1. Encryption
- Antivirus, anti spyware, firewalls
- Turning off identifier broadcasting. (Used so other devices can know about the network and connect to it)
- Change the identifier on the router from the default.
- Change the routers pre-set password
- Allow only approved computers to access the network
What are some security concerns regarding mobile devices?
- Lack of physical security controls: mobile devices under the control of the user. Can be used in environments that are not secure leading to higher risk of theft or tampering
- Use of un-trusted mobile devices. Personal mobile devices assumed not to be trustworthy as security mechanisms adhering to company policy may be non-existent.
- Use of un-trusted networks: traffic with an off-site premise segment. Such as remote access to company network from home.
- Unknown or un-trusted applications
- Interaction with other systems. The synchronisation of data with different services and systems.
- Un-trusted content. QR code scanning for more information.
- GPS. Can be used to target devices for attacks to access restricted systems or networks.
What is traffic security?
All traffic should be encrypted and travel by secure means. SSL, IPv6, VPN.
What is barrier security?
Security mechanisms to protect the network from unauthorised access.
The IEEE 802.11 standard has 8 terms with abbreviations, what are these terms?
Access Point
Basic Service Set
Coordination Function
Distribution System
Extended Service Set
MAC protocol data unit
MAC service data unit
Station
What are the three layers in the IEEE 802 architecture?
Bottom to top
- Physical
- Media access control
- Logical link control
What is the function of the MAC layer?
- Controls access to the transmission medium
- Receives data from the LLC in the form of a MSDU.
On transmission: assemble data into a frame (MPDU) with address and error-detection fields.
On reception: disassemble frame, and perform address recognition and error detection.
Detects errors and discards frames containing errors.
What is the function of the physical layer?
- Encodes/decodes signals
- Bit transmission/reception
- Specification of the transmission medium
- Defined frequency bands and antenna characteristics
What is the function of the logical link control layer?
Responsible for detecting errors using the CRC and recovering from the errors by retransmitting damaged frames.
Optionally: keeps track of which frames where successful and retransmits unsuccessful ones.
What does AP stand for?
Access Point: provides access to the network via wireless connections.
What does BSS stand for?
Basic Service Set: a set of stations controlled by a single coordination function
What is a coordination function?
Coordination Function: logical function that determines when stations in the BSS are allowed to transmit.
What does DS stand for?
Distribution System: a system that interconnects BSSs and integrated LANs to create an ESS.
What does ESS stand for?
Extended Service Set: interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer.