In: Computer Science
I need some keypoint to start and complete this powerpoint, thank you.
"Lake Point Consulting Services (LPCS) provides security
consulting and assurance services to over 500 clients across a wide
range of enterprises in more than 20 states. A new initiative at
LPCS is for each of its seven regional offices to provide
internships to students who are in
their final year of the security degree program at the local
college.
Pomodoro Fresco is a regional Italian pizza chain that provides
free open wireless access to its customers and secure wireless
access for its staff. However, Pomodoro Fresco is concerned about
the security of the WLAN. They have asked LPCS to make a
presentation about wireless attacks and their options for security.
LPCS has asked you to help them in the presentation.
1. Create a PowerPoint presentation for the staff about the threats
against WLANs and the weaknesses of the IEEE 802.11 security
protocols. Also, include information about the more secure WPA2.
Your presentation should contain at least 10 slides"
Threats against WLANs
There are a number of main threats that exist to wireless LANS,
these include:
1. Rogue Access Points/Ad-Hoc Networks
this type of attack requires some amount of physical access; this
is required because if a user associates with a rogue access point
then is unable to perform any of their normal duties the
vulnerability will be short lived and not that effective.
2. Denial of Service
Anybody familiar with network security is aware of the concept of
denial of service (DoS). It is one of the simplest network attacks
to perpetrate because it only requires limiting access to services.
This can be done by simply sending a large amount of traffic at a
specific target.
A denial of service attack can also be used in conjunction with a
rogue access point. For example, a rogue access point could be
setup in a channel not used by the legitimate access point and then
a denial of service attack could be launched at the channel
currently being used causing endpoint devices to try to
re-associate onto a different channel which is used by the rogue
access point.
3. Configuration Problems
Simple configuration problems are often the cause of many
vulnerabilities, this is because many consumer/SOHO grade access
points ship with no security configuration. A novice user can set
up one of these devices quickly and gain access. However they also
open up their network to external use without further
configuration.
4. Passive Capturing
Passive capturing is performed by simply getting within range of a
target wireless LAN and then listening and capturing data. This
information can be used for a number of things including attempting
to break existing security settings and analyzing non-secured
traffic. It is almost impossible to really prevent this type of
attack because of the nature of a wireless network; what can be
done is to implement high security standards using complex
parameters.
Weaknesses of the IEEE 802.11
⦁ It has traffic disruptions.
⦁ Network security and the maintenance needed to stay
secured.
⦁ It is required periodic maintenance.
⦁ Data transmitted over radio waves can be captured by
any Wi-Fi ready devices in the area.
⦁ Unauthorized use.
⦁ It has unauthorized uses.
⦁ Frame spoofing.
⦁ Session hijacking.
Wi-Fi Protected Access 2:-
Wi-Fi Protected Access 2(WPA2) is a network security technology
commonly used on Wi-Fi wireless networks. It's an upgrade from the
original WPA technology, which was designed as a replacement for
the older and much less secure WEP.
WPA2 is used on all certified Wi-Fi hardware since 2006 and is
based on the IEEE 802.11i technology standard for data
encryption.
When WPA2 is enabled with its strongest encryption option, anyone
else within range of the network might be able to see the traffic
but it will be scrambled with the most up-to-date encryption
standards.