0% found this document useful (0 votes)
16 views

Security Final

Uploaded by

youssifmadbouly5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Security Final

Uploaded by

youssifmadbouly5
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

What Is Wi-Fi Security?

Wi-Fi security is the protection of devices and networks connected in a


wireless environment. Without Wi-Fi security, a networking device such as a
wireless access point or a router can be accessed by anyone using a
computer or mobile device within range of the router's wireless signal.
Wireless security is, in essence, preventing unwanted users from accessing a particular Wi-Fi
network. More so, wireless security, also known as Wi-Fi security, aims to ensure that your data
remains only accessible to users you authorize.

Types of Wireless Networks:

Wireless networks can be classified into several types based on their range,
purpose, and technology. Here are some common types:
Based on range of operation:
Wireless Personal Area Network (WPAN): This type of network covers a small
area, typically within a person's reach. Bluetooth and Zigbee are examples of
WPAN technologies. They are commonly used for connecting devices like
smartphones, tablets, and smartwatches.

Wireless Local Area Network (WLAN): WLANs cover a larger area, such as a
home, office, or campus. Wi-Fi is the most common technology for WLANs,
providing wireless connectivity to devices within a specific area.

Wireless Metropolitan Area Network (WMAN): WMANs cover a larger


geographic area, such as a city or metropolitan area. WiMAX (Worldwide
Interoperability for Microwave Access) is an example of WMAN technology,
offering wireless broadband access over longer distances.
Wireless Wide Area Network (WWAN): WWANs cover large geographical areas,
often spanning across cities, regions, or even countries. Cellular networks like 3G,
4G LTE, and 5G are examples of WWANs, providing mobile data and voice
services to users over a wide area.
Based on purpose:
Wireless Sensor Network (WSN): WSNs consist of spatially distributed
autonomous sensors to monitor physical or environmental conditions, such as
temperature, sound, vibration, pressure, motion, or pollutants. These networks are
commonly used in applications like environmental monitoring, industrial
automation, and healthcare.

Ad hoc Wireless Network: Ad hoc networks are decentralized networks where


devices communicate directly with each other without the need for a central
infrastructure or access point. They are often used in scenarios where traditional
infrastructure-based networks are impractical or unavailable, such as in emergency
response situations or military operations.

1. Common Wireless Security Threats


st common ways cybercriminals gain access to WiFi networks is through
password attacks. They can do this by guessing or cracking the password. To
prevent this type of attack, it is crucial to create a strong password that includes a
combination of upper and lower case letters, numbers, and symbols. Avoid using
common words, personal information, and predictable patterns.
2. Man-in-the-middle attacks

A man-in-the-middle attack occurs when a hacker intercepts communication


between two devices on a network. They can then steal sensitive information or
inject malware into the network. To prevent this type of attack, always use a
virtual private network (VPN) when connecting to public WiFi networks. Also,
avoid accessing sensitive information such as bank accounts and credit cards
when using public WiFi.
3. Rogue access points

Rogue access points are unauthorized WiFi devices that hackers set up to gain
access to a network. They can be difficult to detect as they appear to be
legitimate access points. To prevent this type of attack, regularly scan your
network for unauthorized devices. Also, ensure that your WiFi router is
password-protected and that you regularly update its firmware.

4. Eavesdropping

Eavesdropping is when a hacker listens in on the communication between two


devices on a WiFi network, allowing them to steal sensitive information, such as
passwords and credit card numbers. To prevent this type of attack, ensure that
your WiFi network is encrypted using the latest protocols, such as WPA3, and
avoid using outdated ones such as WEP.

5. Denial-of-service attacks

A denial-of-service (DoS) attack is when a hacker floods a network with traffic,


making it inaccessible to users. To prevent this type of attack, use a firewall to
block traffic from suspicious IP addresses. Also, limit the number of devices that
can connect to your network.

Encryption and Authentication:


Encryption plays a crucial role in wireless security by ensuring that data
transmitted over wireless networks remains confidential, secure, and protected
from unauthorized access. Here's how encryption contributes to wireless security:

Confidentiality: Encryption scrambles data transmitted over wireless networks into


an unreadable format using cryptographic algorithms. This prevents unauthorized
users from intercepting and understanding the data as it travels through the air.
Even if an attacker manages to capture the transmitted data, without the encryption
key, they cannot decipher its contents.
Data Integrity: Encryption not only protects the confidentiality of data but also
ensures its integrity. By using cryptographic techniques like message
authentication codes (MACs) and digital signatures, encryption can detect any
unauthorized modifications or tampering of the data during transmission. This
helps in verifying that the data received is the same as the data sent, thereby
maintaining data integrity.

Authentication: Encryption protocols often incorporate mechanisms for user


authentication, verifying the identities of both the sender and receiver of data.
Through techniques like mutual authentication and digital certificates, encryption
helps ensure that only authorized users and devices can access the wireless
network and communicate securely. This prevents unauthorized users from
impersonating legitimate users and gaining unauthorized access to network
resources.

Protection Against Eavesdropping: Wireless networks are susceptible to


eavesdropping attacks, where attackers passively intercept and listen in on
communications between devices. Encryption mitigates this risk by encoding the
transmitted data, making it unreadable to anyone without the encryption key. This
prevents eavesdroppers from extracting sensitive information from wireless
transmissions, enhancing the overall security of the network.

Compliance and Regulation: Encryption is often mandated by regulatory standards


and compliance requirements, particularly in industries handling sensitive data
such as healthcare, finance, and government. Adhering to encryption standards
ensures that wireless networks meet security and privacy regulations, safeguarding
sensitive information and maintaining legal compliance.

Overall, encryption forms the foundation of wireless security, providing essential


protection against various security threats and vulnerabilities inherent in wireless
communication. By implementing robust encryption protocols and adhering to best
practices, organizations can establish secure wireless networks and safeguard their
data and communications from unauthorized access and exploitation.

Secure Wi-Fi Practices - Best Practices for Wireless


Security
The importance of wireless network security cannot be understated. With
the proliferation of mobile devices and the popularity of public Wi-Fi
hotspots, the potential for data breaches and other cybersecurity threats
has increased exponentially.

While there are many different steps that can be taken to secure a
wireless network, these 12 best practices are essential for ensuring that
your data and devices are safe from malicious actors.

1. Enabling Two-Factor Authentication (2FA)


Two-factor authentication adds an extra layer of security to the login
process. It requires users to enter both a username and password, as well
as a code that is generated by an authenticator app. This makes it more
difficult for someone to gain unauthorized access to the network.

To enable two-factor authentication, access the wireless router's


configuration page and enable the feature. Be sure to download an
authenticator app such as Google Authenticator or Authy and have it
available when logging in.

You can also consider using passwordless authentication like cloud radius
for even more robust protection. This is an important best practice
because if someone does manage to get a hold of your password, they'll
be able to access your network. By using a cloud-based solution, you can
be sure that only authorized users will be able to access your network.
3. Encrypting Data

Encrypting data is another important best practice for wireless network


security. Data encryption scrambles data so that it can only be decrypted
and read by authorized users. This helps to protect sensitive information
from being accessed by unauthorized individuals.

Encryption can be implemented in a number of ways, including through


the use of encryption software, hardware, or services. Make sure that
employees are aware of the importance of encrypting sensitive data and
that they know how to properly encrypt files.

4. Disabling SSID Broadcast

Disabling SSID broadcast is another best practice for wireless network


security. When SSID broadcast is enabled, it allows anyone within range of
the wireless network to see the network's name. You can disable SSID
broadcast by accessing the wireless router's configuration page and
disabling the SSID broadcast feature.

The goal is to make it more difficult for unauthorized individuals to


connect to the network. The SSID can still be seen if someone is within
range of the network and uses a wireless network scanner, but it will not
be as easily accessible.

network.

6. Enabling WPA3 Security


Enabling WPA3 security is another best practice for wireless network
security. WPA3 is the most recent and most secure wireless security
protocol. It provides stronger protection than WPA2 and should be used
whenever possible.
When shopping around for a router, make sure to look for ones that
support this most recent security protocol. Earlier protocols were easier to
compromise, so it is important to make sure that WPA3 is enabled.

7. Using A VPN
Using a VPN is another best practice for wireless network security. A VPN
encrypts all traffic between a device and the VPN server, making it more
difficult for someone to eavesdrop on the connection. This is especially
important when using public Wi-Fi networks, as they are often less secure
than private ones. Be sure to only use VPNs from trusted providers and
make sure that employees are aware of the importance of using a VPN
when working remotely.

10. Using A Firewall

Using a firewall is another best practice for wireless network security. A


firewall helps to protect the network by blocking incoming traffic that is
not authorized. This can be especially important in preventing attacks
from malware and other malicious software.

To use a firewall, access the wireless router's configuration page and


enable the feature. There are typically two types of firewalls: network-
based and host-based. Network-based firewalls are typically used in
business environments, while host-based firewalls can be used on
individual devices.

Wireless encryption protocols:


In wireless security, encryption protocols are essential for securing the data
transmitted over wireless networks. Here are some of the main encryption
protocols commonly used in wireless security:
1) WEP (Wired Equivalent Privacy): WEP was the first encryption protocol
used in Wi-Fi networks. It uses the RC4 encryption algorithm to encrypt data
but has significant security vulnerabilities and is now considered insecure.
WEP (Wired Equivalent Privacy) had several significant weaknesses and
vulnerabilities, which led to its widespread abandonment and replacement by more
secure encryption protocols like WPA2 and WPA3. Some of the main negatives of
WEP include:

Weak Encryption: WEP uses the RC4 encryption algorithm, which is vulnerable to
various cryptographic attacks. The key scheduling algorithm in WEP is flawed,
making it relatively easy for attackers to crack the encryption and recover the WEP
key.

Static Keys: WEP relies on static encryption keys that are manually configured on
both the access point and the client devices. These static keys are typically long
and complex, making them difficult to manage and prone to being shared
insecurely. Additionally, the lack of key rotation increases the likelihood of
successful attacks over time.

Initialization Vector (IV) Reuse: WEP uses a 24-bit Initialization Vector (IV) to
initialize the encryption process for each packet. However, due to the limited size
of the IV space, IVs are reused frequently, which weakens the encryption and
makes it susceptible to statistical attacks.

No User Authentication: WEP only provides encryption for wireless


communication and does not include strong authentication mechanisms. This
means that even if an attacker cannot crack the WEP encryption, they can still
perform unauthorized access to the network by capturing and spoofing MAC
addresses.
Lack of Message Integrity: WEP does not provide mechanisms for ensuring the
integrity of transmitted data. This means that an attacker can modify the contents
of data packets without detection, leading to potential data manipulation and
security breaches.

Easily Exploitable Vulnerabilities: Several known vulnerabilities in the WEP


protocol, such as the Fluhrer-Mantin-Shamir (FMS) attack and the KoreK
chopchop attack, make it relatively straightforward for attackers to exploit
weaknesses in WEP encryption and compromise wireless networks.

Overall, the weaknesses and vulnerabilities in the WEP protocol rendered it


inadequate for providing robust security for wireless networks. As a result, WEP
has been largely deprecated in favor of more secure encryption protocols like
WPA2 and WPA3.
2) WPA (Wi-Fi Protected Access): WPA was introduced to address the
weaknesses of WEP. It includes stronger encryption mechanisms and
authentication methods. However, the original WPA protocol has been
largely replaced by WPA2 and WPA3.

3) WPA2 (Wi-Fi Protected Access 2): WPA2 is the current standard for
securing Wi-Fi networks. It uses the AES (Advanced Encryption Standard)
encryption algorithm, which is considered highly secure. WPA2 is widely
adopted and recommended for securing wireless networks.

WPA3 (Wi-Fi Protected Access 3): WPA3 is the latest iteration of the Wi-Fi
Protected Access protocol. It offers enhanced security features compared to WPA2,
including stronger encryption, protection against offline dictionary attacks, and
improved security for open networks.
TKIP (Temporal Key Integrity Protocol): TKIP was introduced as a security
enhancement for WPA, providing a more secure alternative to WEP. However,
TKIP is now considered outdated and insecure, and its use is discouraged in favor
of AES encryption.
An intrusion detection system (IDS) in wireless security is a crucial component
designed to monitor and analyze network traffic for any signs of unauthorized
access, misuse, or malicious activities within a wireless network.
An IDS for wireless security typically operates in two modes:
1. Signature-Based Detection: This mode involves comparing network traffic
patterns against a database of known attack signatures. If a match is found,
indicating a known attack or intrusion attempt, the IDS raises an alarm.
2. Anomaly-Based Detection: In this mode, the IDS establishes a baseline of
normal network behavior and then continuously monitors the network for
any deviations from this baseline. These deviations, which may indicate
suspicious or malicious activities, trigger alerts.
Additionally, IDS can be categorized based on their deployment within the
network:

WHAT IS WIRELESS NETWORK MONITORING?


Manage Devices & Maintain Reliable Connections
WNM is a set of tools that proactively and continuously monitors all aspects of a network,
including the wide range of devices. These devices can be access points (APs), wireless routers,
smartphones, tablets, laptops, and more. WNM checks these devices while maintaining the
reliable connection that organizations depend on.
Continuous Monitoring
To maintain a seamless Wi-Fi network, problems must be discovered immediately through
notifications from the WNM, so that end users don’t experience the issue before it’s detected.
Because wireless networks are comprised of mostly wireless devices, they lack the physical
interfaces that would normally alert network managers to any problems. As such, these networks
need constant monitoring so that any outages and downtime are avoided.
THE BENEFITS OF WNM
Ensure Business Continuity and Increase Productivity
Organizations depend on a reliable Internet connection to keep business running smoothly. Wi-Fi
brings even more benefits to employees so they can stay connected no matter where they are on
the property. With effective WNM, companies ensure that there are no outages because issues are
detected and network managers are notified immediately.
This improves overall productivity and satisfaction within a business, not to mention reducing
the need for support calls, thus saving valuable time. Fewer support personnel may be required
as well, saving money in the long run.
Avoid Network Downtime
In our current wireless, wearable age, there are going to be more wireless devices within a
network than there are wired devices. And WNM allows network managers to monitor all types
of devices, giving them the ability to make quick, evidence-based decisions about how to address
a problem.
Solve WLAN Problems Before They Reach Users
A big benefit of implementing WNM is that problems can be diagnosed and solved before they
reach end users. This mitigates complaints or eliminates them altogether, as users won’t be aware
that there was an issue in the first place.
Easy Access Through Cloud Hosting
7SIGNAL uses cloud hosting so that instant access is available from anywhere. This also helps
organizations avoid maintenance like software upgrades or lengthy backup processes, as these
processes are implemented automatically and with no disruption to the network’s performance or
user experience.
Total Visibility Into Wi-Fi Performance
Because 7SIGNAL’s WNM system is available to view from anywhere, any permitted browser
within the network will have visibility into Wi-Fi performance within the entire organization.
This also applies to any configuration changes that are applied—managers can immediately and
simply verify their true impact on the network.
A "Bring Your Own Device" (BYOD) policy is a set of guidelines and rules
established by an organization that governs the use of personally owned devices
(such as smartphones, laptops, and tablets) for work purposes. BYOD policies
have become increasingly common in workplaces due to the proliferation of
personal devices and their integration into daily business operations.

Security awareness training is a crucial component of any organization's


cybersecurity strategy. It involves educating employees about potential security
threats, best practices for protecting sensitive information, and the importance of
adhering to security policies and procedures. Here's an overview of what security
awareness training typically entails:
1. Understanding Security Risks: Training programs often begin by
explaining common cybersecurity threats, such as phishing attacks, malware
infections, social engineering, and insider threats. Employees learn to
recognize the signs of these threats and understand the potential
consequences for themselves and the organization.
2. Best Practices for Data Protection: Employees are taught how to handle
sensitive information securely, including guidelines for data encryption,
password management, and secure file sharing. They learn the importance of
keeping software and systems up-to-date to prevent vulnerabilities that could
be exploited by attackers.
3. Phishing Awareness: Phishing is a prevalent tactic used by cybercriminals
to trick individuals into revealing sensitive information or installing
malware. Security awareness training typically includes examples of
phishing emails and teaches employees how to identify and report suspicious
messages.
4. Social Engineering Awareness: Employees learn about social engineering
techniques used by attackers to manipulate individuals into divulging
confidential information or performing unauthorized actions. This may
include pretexting, baiting, and tailgating, among others.
5. Device Security: With the increasing use of mobile devices in the
workplace, employees are trained on best practices for securing
smartphones, tablets, and laptops. This includes setting up screen locks,
enabling encryption, and being cautious when connecting to public Wi-Fi
networks.
6. Physical Security: Employees are reminded of the importance of physical
security measures, such as locking their workstations when away from their
desks, preventing unauthorized access to sensitive areas, and properly
disposing of confidential documents.

What is physical security?


A common definition of physical security includes security measures designed to limit
access to authorized individuals, as well as any resources that protect personnel from
harm and property from damage.

So, in the simplest term, physical security is defined as the securing and protecting of
organizational assets from coming to harm as a result of physical events. These events
can range from natural disasters such as fires and floods, to human-inflicted dangers
including theft and vandalism. Accidents and accidental damage also fall under the
umbrella of events that may be covered by a physical security plan.

So, what do physical security systems and plans entail? On the surface, physical
security measures include locks, gates, video security cameras and security guards.
Although these are excellent strategies, there are deeper layers that you should take
into account when creating a physical security plan.

An effective plan should include equipment and technology, and can work alongside
these areas:

 Training: Ensure your staff has the proper knowledge in implementing your
physical security strategy.
 Site design and layout: Equipment and physical security components should be
strategically placed to complement the design and layout of your facility.
 Emergency response readiness: Staff in your facility should be trained on what
to do during certain situations and emergencies.
 Access control: Understand how you will assign access to your staff and limit
access for restricted spaces.
 Environmental components: Create safety measures to mitigate damage from
intentional or unforeseen natural disasters that may happen.

You might also like