2.5 Wireless Security
Key Concepts
1. Wireless Encryption Protocols
Wireless encryption protocols are methods used to secure data transmitted over wireless networks. The most common protocols include WEP, WPA, WPA2, and WPA3.
Example: WEP (Wired Equivalent Privacy) is an older protocol that uses a 40-bit or 104-bit key to encrypt data. However, it is vulnerable to attacks and is no longer considered secure. WPA2 (Wi-Fi Protected Access II) uses Advanced Encryption Standard (AES) to provide stronger encryption and is widely used today.
2. Authentication Methods
Authentication methods ensure that only authorized users can access a wireless network. Common methods include Pre-Shared Key (PSK), Extensible Authentication Protocol (EAP), and 802.1X.
Example: PSK requires users to enter a shared password to access the network. EAP is more secure and supports various authentication methods, such as EAP-TLS (Transport Layer Security) and EAP-PEAP (Protected EAP), which use digital certificates and secure tunnels.
3. Rogue Access Points
Rogue access points are unauthorized wireless access points set up by attackers to intercept or manipulate network traffic. They can be used to launch man-in-the-middle attacks or gain unauthorized access to a network.
Example: An attacker might set up a rogue access point with the same SSID (Service Set Identifier) as a legitimate network. Unsuspecting users connect to the rogue AP, allowing the attacker to capture their credentials and other sensitive information.
4. Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
WIDS and WIPS are security systems designed to detect and prevent unauthorized access to wireless networks. WIDS monitors network traffic for suspicious activity, while WIPS can take automated actions to block threats.
Example: A WIDS might detect a high number of failed authentication attempts from a single device, indicating a brute-force attack. A WIPS could automatically block the device from accessing the network to prevent further attempts.
5. Wireless Network Segmentation
Wireless network segmentation involves dividing a wireless network into smaller, isolated segments to limit the spread of attacks and protect sensitive data. This can be achieved using VLANs (Virtual LANs) and firewalls.
Example: A company might segment its wireless network into separate VLANs for employees, guests, and IoT devices. This ensures that a breach in the guest network does not compromise the employee network, and IoT devices are isolated from sensitive corporate data.
Analogies and Examples
Consider a secure building as an analogy for a wireless network. The building's locks and security systems represent encryption protocols, ensuring that only authorized individuals can enter. The security guards represent authentication methods, verifying the identities of visitors. The building's alarm system represents WIDS, detecting unauthorized entry attempts. The security team represents WIPS, taking action to prevent breaches. Finally, the building's separate wings represent network segmentation, ensuring that a breach in one area does not compromise the entire building.
By understanding and implementing these wireless security concepts, organizations can protect their networks from unauthorized access and potential threats.