Unit 4
Unit 4
UNIT 4
WIRELESS TECHNOLOGY
1
Prepared by : Zuraiti Bt Che Amat
OUTCOMES 1
At the end of this subtopic, student should be able to:
Define wireless technologies.
1
13/01/2016
2
13/01/2016
What is wireless?
Wireless
Devices :
Infrared (IR)
Bluetooth
Radio Frequency
(RF) / Wi-fi
3
13/01/2016
4
13/01/2016
Certain areas of the RF bands have been set aside for use by
unlicensed devices such as wireless LANs, cordless phones
and computer peripherals.
This includes the 900 MHz, 2.4 GHz, and the 5 GHz
frequency ranges.
5
13/01/2016
1 Mobility – Allow for easy connection of both stationary and mobile clients.
6
13/01/2016
7
13/01/2016
WPAN
(Wireless Personal Area Network)
WIRELESS
NETWORKS WLAN
(Wireless Local Area Network)
WWAN
(Wireless Wide Area Network)
8
13/01/2016
Summary
9
13/01/2016
OUTCOMES 2
At the end of this subtopic, student should be able to
define the characteristics of wireless transmission :
1) Signal Propagation (Penyebaran isyarat)
2) Signal Degradation (Penurunan isyarat)
3) Antenna
4) Narrowband, broadband and spread spectrum signals
5) Fixed and mobile wireless communication
10
13/01/2016
1. Signal propagation
A wireless signal would travel directly in a straight line from
its transmitter to its intended receiver.
This type of propagation, known as LOS (line-of-sight), uses
the least amount of energy and results in the reception of the
clearest possible signal.
When an obstacle stands in a signal’s way, the signal may pass
through the object or be absorbed by the object, or it may be
subject to any of the following phenomena : reflection,
diffraction or scattering.
Reflection
Signal
Diffraction
Propagation
Scattering
Prepared by : Zuraiti Bt Che Amat
11
13/01/2016
12
13/01/2016
13
13/01/2016
14
13/01/2016
ii.
i.
iii.
2. Signal degradation
When they do, the original signal issued by the transmitter
will experience fading, or a change in signal strength as a
result of some of the electromagnetic energy being
scattered, reflected, or diffracted after being issued by the
transmitter.
Because of fading, the strength of the signal that reaches the
receiver is lower than the transmitted signal’s strength.
This makes sense because as more waves are reflected,
diffracted, or scattered by obstacles, fewer are likely to reach
their destination.
15
13/01/2016
16
13/01/2016
17
13/01/2016
Wireless
Communication
Fixed VS Mobile?
In fixed wireless systems, the locations of the transmitter and
receiver do not move. The transmitting antenna focuses its
energy directly toward the receiving antenna. This results in a
point-to-point link.
One advantage of fixed wireless is that because the receiver’s
location is predictable, energy need not be wasted issuing signals
across a large geographical area. Thus, more energy can be used
for the signal.
Fixed wireless links are used in some data and voice applications.
For example, a service provider may obtain data services
through a fixed link with a satellite. In cases in which a long
distance or difficult terrain must be traversed, fixed wireless
links are more economical than cabling. Prepared by : Zuraiti Bt Che Amat
18
13/01/2016
Fixed VS Mobile?
However, many types of communications are unsuited to
fixed wireless. For example, a waiter who uses a wireless
handheld computer to transmit orders to the restaurant’s
kitchen could not use a service that requires him to remain
in one spot to send and receive signals. Instead, wireless
LANs, along with cellular telephone, paging, and many
other services use mobile wireless systems.
In mobile wireless, the receiver can be located anywhere
within the transmitter’s range. This allows the receiver to
roam from one place to another while continuing to pick up
its signal.
Prepared by : Zuraiti Bt Che Amat
OUTCOMES 3
At the end of this subtopic, student should be able to:
Describe how to avoid WLAN attack using :
a) Limited access to a WLAN
b) Authentication on a WLAN
c) Encryption on a WLAN
d) Traffic Filtering on a WLAN
19
13/01/2016
20
13/01/2016
21
13/01/2016
22
13/01/2016
23
13/01/2016
24
13/01/2016
b. Authentication on a WLAN
Authentication is the process of permitting entry
to a network based on a set of credentials.
It is used to verify that the device attempting to
connect to the network is trusted.
The use of a username and password is a most
common form of authentication.
Authentication, if enabled, must occur before the
client is allowed to connect to the WLAN.
There are three types of wireless authentication
methods: Open, PSK and EAP.
Prepared by : Zuraiti Bt Che Amat
PSK
Open EAP
AUTHENTICATION
on a WLAN
25
13/01/2016
Open Authentication
Open mode allows any device to connect to the wireless
network. By default, wireless devices do not require
authentication. Any and all clients are able to associate
regardless of who they are.
Open authentication should only be used on public wireless
networks such as those found in many schools and restaurants.
It can also be used on networks where authentication will be
done by other means once connected to the network.
The major advantage of open mode is its simplicity: Any client
can connect easily and without complex configuration. Open
mode is recommended when there are guests who need to get
onto the network, or more generally, when ease of connectivity
is paramount and access control is not required.
26
13/01/2016
Cont.
Though it requires some client-side configuration, a PSK is
relatively easy to configure.
It can be a good choice when there is a small number of
users or when clients do not support more sophisticated
authentication mechanisms, such as WPA2-Enterprise.
A deployment based on a PSK does not scale
well, however.
With a large number of users, it becomes more difficult to
change the PSK, an operation that should be performed
periodically to ensure that the PSK has not been shared
with unwanted users.
27
13/01/2016
28
13/01/2016
29
13/01/2016
30
13/01/2016
c. Encryption on WLAN
Authentication and MAC filtering may stop an
attacker from connecting to a wireless network
but it will not prevent them from being able to
intercept transmitted data.
Encryption is the process of transforming data so
that even if it is intercepted it is unusable.
2 types of encryptions : WEP & WPA
31
13/01/2016
2 Types of Encryption
1 WEP
2 WPA
32
13/01/2016
33
13/01/2016
34
13/01/2016
35
13/01/2016
(cont.)
By removing unwanted, undesirable and suspicious
traffic from the network, more bandwidth is devoted
to the movement of important traffic and improves
the performance of the WLAN.
For example, traffic filtering can be used to block all
telnet traffic destined for a specific machine, such as
an authentication server.
Any attempts to telnet into the authentication server
would be considered suspicious and blocked.
36
13/01/2016
37
13/01/2016
OUTCOMES 4
At the end of this subtopic, student should be able to:
38
13/01/2016
39
13/01/2016
1 Information theft
2 Identity theft
4 Disruption of service
Prepared by : Zuraiti Bt Che Amat
40
13/01/2016
41
13/01/2016
Scenario Choice
Stealing an automotive engine design from a competitor.
Obtaining personal information to impersonate another and obtain credit.
Destroying database records on a computer hard drive.
Changing the grade received for a university course from a C to an A in the student
records database.
Overloading a web server to reduce its performance preventing legitimate users
from accessing it.
42
13/01/2016
Internal Source
SOURCE
External Source
• In some cases, an internal threat can come from a trustworthy employee who
picks up a virus or security threat, while outside the company and
3 unknowingly brings it into the internal network.
43
13/01/2016
44
13/01/2016
Social Engineering
• Social Engineering refers to a collection of techniques used to deceive
internal users into performing specific actions or revealing confidential
1 information.
45
13/01/2016
Pretexting
Pretexting is a form of social engineering where an invented
scenario (the pretext) is used on a victim in order to get the
victim to release information or perform an action.
46
13/01/2016
Phishing
Phishing is a form of social engineering where the phisher
pretends to represent a legitimate outside organization.
47
13/01/2016
48
13/01/2016
OUTCOMES 5
At the end of this subtopic, student should be able to:
Describe Viruses, Worms and Trojan Horses.
Explain denial of service and brute force attacks.
Differentiate Spyware, Tracking Cookies, Adware
and Pop-up.
Describe Spam.
-Virus
Exploit the vulnerabilities -Worm
in computer software. - Trojan horse
49
13/01/2016
Viruses
1 A virus is a program that runs and spreads by modifying other programs or
files. A virus cannot start by itself; it needs to be activated.
50
13/01/2016
Worms
A worm is similar to a virus, but unlike a virus does not need
1 to attach itself to an existing program.
51
13/01/2016
Trojan Horses
1 A Trojan horse is a non-self replicating program that is written to
appear like a legitimate program, when in fact it is an attack tool.
3 It may be relatively harmless or can contain code that can damage the
contents of the computer's hard drive.
52
13/01/2016
53
13/01/2016
SYN (Synchronous)
Flooding
2 common
DoS attacks
Ping of death
54
13/01/2016
Ping of death
A packet that is greater in size than the maximum
allowed by IP (65,535 bytes) is sent to a device.
This can cause the receiving system to crash.
55
13/01/2016
56
13/01/2016
57
13/01/2016
Brute Force
A Brute force attack is another type of attack that
may result in denial of services.
With brute force attacks, a fast computer is used
to try to guess passwords or to decipher an
encryption code.
The attacker tries a large number of possibilities
in rapid succession to gain access or crack the
code.
Brute force attacks can cause a denial of service
due to excessive traffic to a specific resource or
by locking out user accounts.
Prepared by : Zuraiti Bt Che Amat
58
13/01/2016
Spyware
Spyware is any program that gathers personal information
from your computer without your permission or
knowledge.
This information is sent to advertisers or others on the
Internet and can include passwords and account numbers.
Spyware is usually installed unknowingly when
downloading a file, installing another program or clicking a
popup.
It can slow down a computer and make changes to internal
settings creating more vulnerabilities for other threats. In
addition, spyware can be very difficult to remove.
Tracking Cookies
Cookies are a form of spyware but are not always
bad.
They are used to record information about an
Internet user when they visit websites.
Cookies may be useful or desirable by allowing
personalization and other time saving techniques.
Many web sites require that cookies be enabled in
order to allow the user to connect.
59
13/01/2016
Adware
Adware is a form of spyware used to collect information
about a user based on websites the user visits.
That information is then used for targeted advertising.
Adware is commonly installed by a user in exchange for a
"free" product.
When a user opens a browser window, Adware can start
new browser instances which attempt to advertize
products or services based on a user's surfing practices.
The unwanted browser windows can open repeatedly, and
can make surfing the Internet very difficult, especially with
slow Internet connections.
Adware can be very difficult to uninstall.
Prepared by : Zuraiti Bt Che Amat
60
13/01/2016
61
13/01/2016
62
13/01/2016
63
13/01/2016
64
13/01/2016
OUTCOMES 6
At the end of this subtopic, student should be able to:
Define common security measures.
Identify the importance of updated software and
patches.
Complete update software patches and antivirus
latest patterns.
65
13/01/2016
66
13/01/2016
67
13/01/2016
68
13/01/2016
Security Tools
Some of the security tools and applications used
in securing a network include:
Software patches and updates
Virus protection
Spyware protection
Spam blockers
Popup blockers
Firewalls
69
13/01/2016
70
13/01/2016
71
13/01/2016
72
13/01/2016
73
13/01/2016
74
13/01/2016
Anti-virus Software
Anti-virus software can be used as both a preventative tool and
as a reactive tool. It prevents infection and detects, and
removes, viruses, worms and Trojan horses.
Some of the features that can be included in Anti-virus
programs are:
Email checking - Scans incoming and outgoing emails, and
identifies suspicious attachments.
Resident dynamic scanning - Checks executable files and
documents when they are accessed.
Scheduled scans -Virus scans can be scheduled to run at regular
intervals and check specific drives or the entire computer.
Automatic Updates - Checks for, and downloads, known virus
characteristics and patterns. Can be scheduled to check for
updates on a regular basis.
75
13/01/2016
Anti Spam
Spam is not only annoying; it can overload email servers and
potentially carry viruses and other security threats.
Additionally, Spammers take control of a host by planting code
on it in the form of a virus or a Trojan horse. The host is then
used to send spam mail without the user's knowledge. A
computer infected this way is known as a Spam mill.
Anti-spam software protects hosts by identifying spam and
performing an action, such as placing it into a junk folder or
deleting it. It can be loaded on a machine locally, but can also be
loaded on email servers.
Many ISPs offer spam filters. Anti-spam software does not
recognize all spam, so it is important to open email carefully. It
may also accidentally identify wanted email as spam and treat it
as such.
76
13/01/2016
77
13/01/2016
Popup Blockers
Popup stopper software can be installed to
prevent pop ups and pop-unders. Many web
browsers include a popup blocker feature by
default.
Note that some programs and web pages create
necessary and desirable pop ups. Most popup
blockers offer an override feature for this
purpose.
78
13/01/2016
79
13/01/2016
EXERCISES
80
13/01/2016
1.
2.
81
13/01/2016
3.
4.
82
13/01/2016
5.
6.
83
13/01/2016
SUMMARY
84
13/01/2016
85
13/01/2016
86
13/01/2016
EXERCISES
87
13/01/2016
88
13/01/2016
89
13/01/2016
90
13/01/2016
91
13/01/2016
10
11
92
13/01/2016
12
93