jagomart
digital resources
picture1_History Of Computers Ppt Free Download 76980 | Wireless Networking Security


 149x       Filetype PPT       File size 0.08 MB       Source: www.cs.clemson.edu


File: History Of Computers Ppt Free Download 76980 | Wireless Networking Security
preview brief history of wireless networking types of wireless security o unsecured o wep o wpa o wpa2 why use wireless encryption additional security measures for your router what to ...

icon picture PPT Filetype Power Point PPT | Posted on 02 Sep 2022 | 3 years ago
Partial capture of text on file.
  Preview
  • Brief History of Wireless networking 
  • Types of Wireless Security
    o Unsecured
    o WEP
    o WPA
    o WPA2
  • Why use wireless encryption?
  • Additional Security Measures for your router
  • What to do if on an unsecured network
 History of Wireless Networking 
  • Wireless Local Area Networks (WLAN) have been 
   around since 1970.
  
  • The first model was created at the University of 
   Hawaii by Norman Abramson.
  
  • This was a star topology and connected 7 computers 
   across 4 islands.
  
  •  Today, wireless networking is largely standardized 
   by IEEE and their various versions of 802.11.
 Unsecured
  • A wireless network with no sort of encryption algorithm 
   applied.
  
  • Any user can readily authenticate and access the 
   internet.
  
  •  Packets are unencrypted and visible.
  
  •  Attacks:
    o ARP Spoofing - Associate attacker's MAC address with 
     default gateway's IP. All traffic meant for gateway goes 
     through attacker's machine first. Traffic can be passed 
     through (passive sniff) or modified and passed (MIM). 
    o Firesheep - Firefox extension that decodes cookies on 
     unsecured network. Allows log in as user for sites like 
     Facebook and Twitter.
 WEP: Wired Equivalent Privacy 
  • Deprecated security algorithm for IEEE 802.11 
   networking.
  • Introduced as part of original 802.11 protocol in 1997. 
  • Standard 64 bit  WEP uses 40 bit key. Other 24 bits is IV.
  • Can also use 128/256 bit protocols. 
  • IV (Initialization Vector) - prepended onto packets and is 
   based on pre-shared key. 
  • Such short IVs in 64 bit caused reuse of IVs with same 
   key, which significantly shortened key cracking times of 
   WEP. 
  • Attacks:
   o Aircrack-ng - Linux command line tool. Sniffs packets 
    on a network to obtain IVs and breaks WEP key using 
    information present in the IVs. Can be done in less than 
    10 minutes. 
 WPA: Wi-Fi Protected Access
  • Released by Wi-Fi Alliance in 2004 in IEEE 802.11i 
   standard
  • Replaced the exploitable WEP Encryption scheme
  • Required support of TKIP protocol 
  • Also supported AES encryption
  • Designed to be backward compatible with older 
   hardware after firmware upgrades
  • 4-Way Handshake and Group Key Handshake
  • "Beck-Tews Attack" - TKIP Exploit:
    o PhD Candidate in Germany discovered a method 
     for injecting small packets into a network using 
     WPA and TKIP
    o Does not reveal full network key though, but can 
     be used to spoof ARP and DNS packets 
The words contained in this file might help you see if this file matches what you are looking for:

...Preview brief history of wireless networking types security o unsecured wep wpa why use encryption additional measures for your router what to do if on an network local area networks wlan have been around since the first model was created at university hawaii by norman abramson this a star topology and connected computers across islands today is largely standardized ieee their various versions with no sort algorithm applied any user can readily authenticate access internet packets are unencrypted visible attacks arp spoofing associate attacker s mac address default gateway ip all traffic meant goes through machine be passed passive sniff or modified mim firesheep firefox extension that decodes cookies allows log in as sites like facebook twitter wired equivalent privacy deprecated introduced part original protocol standard bit uses key other bits iv also protocols initialization vector prepended onto based pre shared such short ivs caused reuse same which significantly shortened cracki...

no reviews yet
Please Login to review.