140 likes | 286 Views
Implementing Security measures on WLAN. Ir. Yohanes Sumaryo, MBA IndoWLI. “Learning from "best practice" in IT security in the United States”. Indonesia's Readiness and Response to The Threat of Cybercrime March 19, 2003 Jakarta Indonesia. Implementing Security measures on WLAN.
E N D
Implementing Security measures on WLAN Ir. Yohanes Sumaryo, MBA IndoWLI “Learning from "best practice" in IT security in the United States” Indonesia's Readiness and Response to The Threat of Cybercrime March 19, 2003 Jakarta Indonesia
Implementing Security measures on WLAN Introduction Security measures on Wireless Network Implementation examples Summary
Implementing Security measures on WLAN • Wired vs Wireless LAN • Degree of security varied • Cost vs performance • Most secure system: no network, no power, no access (locked underground?) • Three key issues that must be balanced to achieved required level of security
Implementing Security measures on WLAN • Authentication • Privacy • Authorization
Implementing Security measures on WLAN Authentication • Less worried on a wired LAN (port physically installed in controlled areas) • WLAN footage, transmission medium • MAC access control list (ACL) • IEEE 802.1X protocol is coming
Implementing Security measures on WLAN Privacy • Data stream encryption , WEP 40,128,256 bit RC4 encryption mechanism • NIC hardware implementation • Static & dynamic key distribution • Weak, easily hacked • Management nightmare for big networks
Implementing Security measures on WLAN Authorization-1 • Policy dependence • O/S, File system difference • User access right base • Place and time of access • User friendly vs system security
Implementing Security measures on WLAN Authorization-2 • EAP (extended authentication & authorization protocol) • Radius • VPN • Hardware encryption & authoring
Implementing Security measures on WLAN Examples: • Channel number, SSID, WEP • ACL – MAC access control list • Client access status • Network access status
Implementing Security measures on WLAN Examples-1
Implementing Security measures on WLAN Examples-2
Implementing Security measures on WLAN Examples-3
Implementing Security measures on WLAN Examples-4
Implementing Security measures on WLAN Summary • Cost vs performance considerations • User friendly against security loop hole • Size matter • Best practice • Compromised