Network Security-Wireless Technology: N.Chitra M.Golda Vincy

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 17

NETWORK SECURITY-WIRELESS

TECHNOLOGY

N.CHITRA
M.GOLDA VINCY
INTRODUCTION

• Wireless Network Security is the


prevention of unauthorized access or
damage to computers
• Wireless Technologies use Radio Frequency
transmissions as the means for trasmitting
data
Wireless Devices
• Wireless Handheld Devices
• Text Messaging Devices
This technology is designed to monitor a user’s
inbox for new e-mail.
• PDAs
PDAs are small enough to fit into the shirts or a
purse . It offers many applications.
• Smart Phones
Mobile phones with information processing and
data networking capabilities are called “Smart Phones”.
WIRELESS STANDARDS
EMERGING WIRELESS
TECHNOLOGY
• The technologies which provide high data
transmission rates are
– GSM-Based[Global System for Mobile
Communications]
– GPRS[General Packet Radio Service]
– LMDS[Local Multipoint Distribution
Services]
– EDGE[Enhanced Data GSM Environment]
– UMTS[Universal Mobile
Telecommunication Service]
ATTACKS

• Attacks against information in


electronic form
 Information can be
copied but not lost
It resides in both the original
owner’s and the attacker’s hands
TYPES OF ATTACKS
SECURITY OF 802.11
WIRELESS LANS

•The security services are provided by the Wired


Equivalent Privacy(WEP)
•WEP does not provide end-end security but provides
security only for the wireless portions of the
connection
Security Features of 802.11
Wireless LANs per the Standard
• There are three basic security services defined by
IEEE for the WLAN environment
– Authentication
• Open-System authentication
• Shared-Key authentication
– Confidentiality/Privacy
– Integrity
SOFTWARE SOLUTIONS

• Firewalls
• Encryption
• Anti Virus Software
• Intrusion Detection System
FIREWALLS

• Protecting from the external attacks


• Firewalls are border security products
• It allows appropriate traffic to flow

Firewall Internal Network

Internet
Internet
ENCRYPTION AND
DECRYPTION
ENCRYPTION
• Encryption hides the information from the unauthorized
individuals
• It converts the plaintext into unreadable[cipher text]

DECRYPTION
• Decryption is the process of reverting the cipher text back
to plaintext
• It uses Key[Cryptographic Algorithms] to encrypt and
decrypt the information
ANTIVIRUS SOFTWARE

 Anti virus software is a part of good security


program
 A virus scanner searches and boot records in
the web.
INTRUSION DETECTION SYSTEM

 Intrusion detection is another tool for security


purposes to protect a web from attack

 It identifies the Hacker when a penetration is


attempted

 It places the NIC[Network Interface Card] on the


system into promiscuous mode
CONCLUSION

 Thus there are many Hacking


techniques(attacks) that are adopted by the
Hackers to destroy the web and the
techniques used to secure the web
Y OU
NK
T HA
QUERIES?...

You might also like