Title: Implementing Security measures on WLAN
1Implementing Security measures on WLAN
Learning from "best practice" in IT security in
the United States
- Ir. Yohanes Sumaryo, MBA
- IndoWLI
Indonesia's Readiness and Response to The Threat
of Cybercrime March 19, 2003 Jakarta Indonesia
2Implementing Security measures on WLAN
- Introduction
- Security measures on Wireless Network
- Implementation examples
- Summary
3Implementing Security measures on WLAN
- Wired vs Wireless LAN
- Degree of security varied
- Cost vs performance
- Most secure system no network, no power, no
access (locked underground?) - Three key issues that must be balanced to
achieved required level of security
4Implementing Security measures on WLAN
- Authentication
- Privacy
- Authorization
5Implementing Security measures on WLAN
- Authentication
- Less worried on a wired LAN (port physically
installed in controlled areas) - WLAN footage, transmission medium
- MAC access control list (ACL)
- IEEE 802.1X protocol is coming
6Implementing Security measures on WLAN
- Privacy
- Data stream encryption , WEP 40,128,256 bit RC4
encryption mechanism - NIC hardware implementation
- Static dynamic key distribution
- Weak, easily hacked
- Management nightmare for big networks
7Implementing Security measures on WLAN
- Authorization-1
- Policy dependence
- O/S, File system difference
- User access right base
- Place and time of access
- User friendly vs system security
8Implementing Security measures on WLAN
- Authorization-2
- EAP (extended authentication authorization
protocol) - Radius
- VPN
- Hardware encryption authoring
9Implementing Security measures on WLAN
- Examples
- Channel number, SSID, WEP
- ACL MAC access control list
- Client access status
- Network access status
10Implementing Security measures on WLAN
11Implementing Security measures on WLAN
12Implementing Security measures on WLAN
13Implementing Security measures on WLAN
14Implementing Security measures on WLAN
- Summary
- Cost vs performance considerations
- User friendly against security loop hole
- Size matter
- Best practice
- Compromised