Chapter 01
Chapter 01
Chapter 01
OSI Model
Standards Organizations
Institute of Electrical and Electronics Engineers (IEEE)
• Create standards for compatibility and coexistence between
networking equipment
– Not just wireless networking equipment
• Mission is to “foster technological innovation and excellence for
the benefit of humanity.”
IEEE & OSI Model
https://t1.daumcdn.net/cfile/tistory/2169FB3D559179C720
Standards Organizations
Internet Society (ISOC)
• RFC 3935
– “…to produce high quality, relevant technical and engineering
document. …These documents include protocol standards, best current
practices, and informational documents of various kinds.”
• Internet Engineering Task Force (IETF)
• Internet Architecture Board (IAB)
• Internet Corporation for Assigned Names and Numbers
(ICANN)
• Internet Engineering Steering Group (IESG)
• Internet Research Task Force (IRTF)
802.11 Networking Basics
• The OSI Model
• TCP/IP
• Routing
• Switching
http://smartcardpoint.com/all-about-the-data-encryption-process/
802.11 Security Basics
Data privacy
• Cryptanalysis: The science of decrypting the cipher-
text without the knowledge of the key or cipher
802.11 Security Basics
Authentication, authorization, and accounting (AAA)
• Authentication
– Verification of user identity and credentials
– Users must identify themselves by presenting
usernames and passwords, etc.
– Multifactor-authentication is the most secure
approach.
802.11 Security Basics
Authentication, authorization, and accounting (AAA)
• Authorization
– Determines if the device or user is authorize to have
access to network resources
– It might be device-, time-, and location-dependent
– It takes place after authentication
802.11 Security Basics
Authentication, authorization, and accounting (AAA)
• Accounting
– It keeps a historical trail of who used what, when,
where, and how.
– Keeping an accounting trail is a requirement is most
industries.
802.11 Security Basics
Segmentation
• Process of separating user traffic within the network
• As important as strong encryption and AAA
• It can be achieved through the use of routers, VPNs,
and VLANs
• For 802.11, the most common technique is the
creation of WVLANS
802.11 Security Basics
Monitoring
• It is important for the sake of
– Performance analysis:
• Certify that the system is responding as planned
– Security analysis
• Certify that the system is secure against attacks
and intrusion- free
802.11 Security Basics
Monitoring
• To monitor malicious wireless activity, wireless IDS and
wireless IPS should be used
• WIDS and WIPS classify valid and invalid devices on the
network
• WIPS can also mitigate attacks from rogue AP and
rogue users
802.11 Security Basics
Policy
• Without security polices any effort to secure the
network is worthless.
• It must be clearly defined and enforced to solidify the
effectiveness of the WLAN security components.
802.11 Security History