Lecture Network security: Chapter 8 - Dr. Munam Ali Shah

The topic discussed in this chapter are internet security, wwireless security. After studying this chapter you will be able to present an overview of security threats and countermeasures for wireless networks, understand the unique security threats posed by the use of mobile devices with enterprise networks. | Network Security Lecture 8 Presented by: Dr. Munam Ali Shah Summary of the previous lecture We learnt why wireless networks are more prone to security threats and vulnerabilities. We studied different 5 different ways to secure a WLAN, ., disabling the SSID, MAC filtration, applying security mode such as WEP or WPA etc. Outlines We will continue our discussion on: Wireless Security Wireless Network Threats Wireless Security Measures Mobile Device Security Security Threats Objectives You would be able to present an overview of security threats and countermeasures for wireless networks. Understand the unique security threats posed by the use of mobile devices with enterprise networks. Did You? Did you practice applying different techniques to secure the WLAN in your home or office? Wireless Networking Components Wireless Security Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks. Some of the | Network Security Lecture 8 Presented by: Dr. Munam Ali Shah Summary of the previous lecture We learnt why wireless networks are more prone to security threats and vulnerabilities. We studied different 5 different ways to secure a WLAN, ., disabling the SSID, MAC filtration, applying security mode such as WEP or WPA etc. Outlines We will continue our discussion on: Wireless Security Wireless Network Threats Wireless Security Measures Mobile Device Security Security Threats Objectives You would be able to present an overview of security threats and countermeasures for wireless networks. Understand the unique security threats posed by the use of mobile devices with enterprise networks. Did You? Did you practice applying different techniques to secure the WLAN in your home or office? Wireless Networking Components Wireless Security Wireless networks, and the wireless devices that use them, introduce a host of security problems over and above those found in wired networks. Some of the key factors contributing to the higher security risk of wireless networks compared to wired networks include the following: Channel Mobility Accessibility Resources Wireless Security Channel: Wireless networking typically involves broadcast communications, which is far more susceptible to eavesdropping and jamming than wired networks. Wireless networks are also more vulnerable to active attacks that exploit vulnerabilities in communications protocols. Wireless Security Mobility: Wireless devices are, in principal and usually in practice, far more portable and mobile than wired devices. This mobility results in a number of risks, described subsequently. Resources: Some wireless devices, such as smartphones and tablets, have sophisticated operating systems but limited memory and processing resources with which to counter threats, including denial of service and malware Accessibility: Some wireless devices, such as sensors and robots, may be left unattended in remote and/or hostile .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.