Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). WEP is one of the least secure forms of laptop computers have wireless cards pre-installed. The ability to enter a network while mobile has great benefits. However, wireless networking is prone to some security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into wired networks | Wireless Security Mark Nakrop Managing Director nForce Security Systems Wireless Security, Advanced Wireless LAN Hacking Advanced Attack Wireless Best Practices Wireless Hacking Tools wlan-jack, essid-jack, monkey-jack, kracker-jack Network Stumbler Mitigation Strategies Agenda Conventional LAN Security Model Firewall shields inside from outside. Enterprise Premises Internet Corporate Firewall LAN is confined to wires within the premises. Inside is secure. Outside in insecure. Internet Enterprise Premises WiFi Breaks the Conventional Model Wi-Fi security solutions are needed. Attacks can happen over air. Attacks bypass the firewall. Internet Corporate Firewall Network not confined to wires/premises anymore. Ad ap in image & dark ihe Threats from Unmanaged Devices Common Rogue Access Points Enterprise Network Neighboring Network ? Ad Hoc Denial of Service Attack AP MAC Spoofing Rogue AP Mis-configured AP Unauthorized Association Mis-association Honeypot Mis-configured Access . | Wireless Security Mark Nakrop Managing Director nForce Security Systems Wireless Security, Advanced Wireless LAN Hacking Advanced Attack Wireless Best Practices Wireless Hacking Tools wlan-jack, essid-jack, monkey-jack, kracker-jack Network Stumbler Mitigation Strategies Agenda Conventional LAN Security Model Firewall shields inside from outside. Enterprise Premises Internet Corporate Firewall LAN is confined to wires within the premises. Inside is secure. Outside in insecure. Internet Enterprise Premises WiFi Breaks the Conventional Model Wi-Fi security solutions are needed. Attacks can happen over air. Attacks bypass the firewall. Internet Corporate Firewall Network not confined to wires/premises anymore. Ad ap in image & dark ihe Threats from Unmanaged Devices Common Rogue Access Points Enterprise Network Neighboring Network ? Ad Hoc Denial of Service Attack AP MAC Spoofing Rogue AP Mis-configured AP Unauthorized Association Mis-association Honeypot Mis-configured Access Points Denial of Service De-authentication flood Packet storm MAC Spoofing APs Malicious Honeypot APs Unauthorized associations Client mis-associations Ad hoc connections Mis-configured animation – red Z should come when animation comes Honeypot should be shown in red and outsize premises. MAC spoofing animation should be made technically correct. Goals of WLAN Security Fortify authorized communication Access control and encryption over wireless link WEP WPA adequately address this problem Protect the network from unmanaged devices Rogue APs, DoS attacks, client misassociations, Honeypots, ad hoc networks, MAC spoofing etc. Current pain point in enterprise network Wireless Intrusion Detection and Prevention Systems , , etc. IEEE standard – based on well known Ethernet standards – FHSS or DSSS, WEP, GHz, Infrastructure (BSS) or Ad-Hoc (iBSS) Limited to 2Mb/s due to FCC limits on dwell times per frequency hop – DSSS only, WEP, GHz, .