Top Banner
Evaluating Wireless Networks PCIE IT Roundtable Evaluating Wireless Networks PCIE IT Roundtable Workshop October 14, 2003
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Presentation

Evaluating Wireless NetworksPCIE IT Roundtable

Evaluating Wireless Networks

PCIE IT Roundtable WorkshopOctober 14, 2003

Page 2: Presentation

2

Evaluating Wireless NetworksPCIE IT Roundtable

Outline

• Introduction to wireless networks• Threats and vulnerabilities• Evaluating wireless networks

• Objectives• Methodology• Tools• Findings• Recommendations

• Conclusion

Page 3: Presentation

3

Evaluating Wireless NetworksPCIE IT Roundtable

Introduction to Wireless Networks

• Rapid growth computer communications technology

• Agencies increasingly use wireless networks• Enhanced mobility• Greater productivity• Low implementation costs• Painless installation

Page 4: Presentation

4

Evaluating Wireless NetworksPCIE IT Roundtable

Introduction to Wireless Networks (cont.)

• Use of radio waves instead of cables• Major standard

• Institute of Electrical and Electronic Engineers (IEEE) 802.11, Wireless Local Area Networks

• Components of a Wi-Fi network• Access Points (Hot Spot)• Wireless clients (e.g. laptops, PDAs)

Page 5: Presentation

5

Evaluating Wireless NetworksPCIE IT Roundtable

Page 6: Presentation

6

Evaluating Wireless NetworksPCIE IT Roundtable

Threats

• Disclosure of sensitive/confidential data• Denial of service (DoS)• Unauthorized access to wireless-enabled

resources• Potential weakening of existing security

measures on connected wired networks and systems

Page 7: Presentation

7

Evaluating Wireless NetworksPCIE IT Roundtable

Page 8: Presentation

8

Evaluating Wireless NetworksPCIE IT Roundtable

Vulnerabilities

• Wired Equivalent Privacy (WEP) encryption standard extremely weak

• Radio signals susceptible to jamming and interference• Protocol vulnerabilities allow

• Network sessions to be taken over by an intruder• Injection of invalid data into network traffic• Network reconnaissance

• Default configurations create “open” network

Page 9: Presentation

9

Evaluating Wireless NetworksPCIE IT Roundtable

Wireless Automatically Enabled

“Roam if you want to. Windows XP automatically recognizes the 802.11 wireless network you’re near and connects you to it.” Microsoft Windows XP Retail box

Page 10: Presentation

10

Evaluating Wireless NetworksPCIE IT Roundtable

Evaluating Wireless Networks

• Wireless networks are• Easy to implement• Difficult to secure

• Policies often have not been developed

Page 11: Presentation

11

Evaluating Wireless NetworksPCIE IT Roundtable

Evaluation Objectives

• Assess the current Agency position regarding wireless networks

• Examine the use of wireless technology• Evaluate the security of the wireless network and

applications including threats to• Data integrity• Confidentiality• Availability of services and resources

• Determine the level of user awareness of wireless technology

Page 12: Presentation

12

Evaluating Wireless NetworksPCIE IT Roundtable

Evaluation Methodology

• External scanning to illustrate the ease with which unauthorized persons could intercept wireless signals

• Internal scanning and physical inspection to verify the source of signals

• Traffic analysis to see if sensitive data is being transmitted, if transmissions are encrypted, and how vulnerable the networks are to attack

• Review network topologies to assess connectivity to wired networks and determine measures to protect wired networks

• Meet with wireless users and administrators to assess awareness, employee expertise, and strength of security measures

Page 13: Presentation

13

Evaluating Wireless NetworksPCIE IT Roundtable

Content Analysis

• Characterize data on the network• View potential vulnerabilities• Determine appropriate network use• Assist in review of policy conformance• 18 USC 2511(2)(a)(i) allows protectors of

systems (non law-enforcement) to look at content of wireless transmissions

Page 14: Presentation

14

Evaluating Wireless NetworksPCIE IT Roundtable

Evaluation Tools

• Hardware• Laptop• Wireless network card• Antenna• GPS

• Wireless sniffing software• WEP encryption cracking software• Mapping software

Page 15: Presentation

15

Evaluating Wireless NetworksPCIE IT Roundtable

Findings

• Wireless networks with inadequate security• Range of wireless networks exceed physical boundaries

of user organizations• Non-existent or inadequate policies for wireless networks• No risk assessments were performed prior to wireless

implementation• No logical separation of wireless networks from wired

counterparts• Insufficient employee awareness

Page 16: Presentation

16

Evaluating Wireless NetworksPCIE IT Roundtable

Example: Many wireless networks do not use WEP or other encryption to protect network traffic.

▲ = Access points using encryption▲ = Access points without encryption

Page 17: Presentation

17

Evaluating Wireless NetworksPCIE IT Roundtable

Example: The radio signal from a wireless network can spill over from the building where access points are located to neighboring buildings, parking lots and public roads.

Page 18: Presentation

18

Evaluating Wireless NetworksPCIE IT Roundtable

Example: These packet traces show highly confidential data that can be captured from a wireless network

Page 19: Presentation

19

Evaluating Wireless NetworksPCIE IT Roundtable

General Evaluation Recommendations

• Develop wireless network policies• Conduct risk assessments to determine required level of

security• Limit access to wireless networks through the use of

wireless security measures (ie. 802.11i or WPA)• Maintain logical separation between wireless and wired

networks• Perform wireless scans to identify wireless networks and

applications (on a regular basis)• Enforce wireless network policies

Page 20: Presentation

20

Evaluating Wireless NetworksPCIE IT Roundtable

Information Sharing

• Awareness• Collaborative use of findings• Confidentiality

Page 21: Presentation

21

Evaluating Wireless NetworksPCIE IT Roundtable

Conclusion

• Wireless network evaluations are easy to conduct using inexpensive or freely available tools.

• Evaluations are very necessary• Wireless networks are inexpensive, convenient, and

simple to use – so people will use them. • BUT, wireless networks are vulnerable.

Page 22: Presentation

22

Evaluating Wireless NetworksPCIE IT Roundtable

Contact for Wireless Network Evaluations

Jamil Farshchi

(202) 358-1897

[email protected]