CertCities.com -- The Ultimate Site for Certified IT Professionals
Register today for a Free Sponsored Tech Library Webcast and you could WIN! Share share | bookmark | e-mail
  Microsoft®
  Cisco®
  Security
  Oracle®
  A+/Network+"
  Linux/Unix
  More Certs
  Newsletters
  Salary Surveys
  Forums
  News
  Exam Reviews
  Tips
  Columns
  Features
  PopQuiz
  RSS Feeds
  Press Releases
  Contributors
  About Us
  Search
 

Advanced Search
  Free Newsletter
  Sign-up for the #1 Weekly IT
Certification News
and Advice.
Subscribe to CertCities.com Free Weekly E-mail Newsletter
CertCities.com

See What's New on
Redmondmag.com!

Cover Story: IE8: Behind the 8 Ball

Tech-Ed: Let's (Third) Party!

A Secure Leap into the Cloud

Windows Mobile's New Moves

SQL Speed Secrets


CertCities.com
Let us know what you
think! E-mail us at:



 
 
...Home ... Editorial ... Columns ..Column Story Saturday: April 5, 2014


 Dulaney on Certs  
Emmett Dulaney
Emmett Dulaney


 A Visual Guide to Wireless Security Standards
More exams are increasing their focus on wireless security, and with good reason: Very few real-world IT environments can stay afloat without a robust wireless security system.
by Emmett Dulaney  
7/15/2011 -- Wireless security is one of those topics that that keep expanding on certification exams as they become more important (and more implemented) in actual IT environments. Wireless security was greatly expanded in the SY0-301 version of the CompTIA Security+ exam, and is also prominent in the Network+ exam. This visual guide -- based on definitions in the Security+ Study Guide, 5th Edition and upcoming Network+ Exam Cram 4th Edition -- illustrates the various wireless security standards each of these exams expects you to know.

To make the concepts easily understandable, imagine a door and the security that is provided by the handle. In the absence of any security standard, the handle can be opened by anyone, and there isn't a lock on it.

1

WEP
Realizing that allowing anyone who wants access to the network isn't a good scenario for most environments, Wired Equivalent Privacy (WEP) was first added. It is a protocol originally designed to provide privacy "equivalent" to that of a wired network and was implemented in a number of wireless devices, including PDAs and cell phones. WEP is vulnerable due to weaknesses in the way the encryption algorithms (RC4) are employed. These weaknesses allow the algorithm to potentially be cracked in as little as five minutes using available PC software. This makes WEP one of the more vulnerable protocols available for security. 

As an example, the initialization vector (IV) that WEP uses for encryption is 24-bit, which is quite weak and means that IV's are reused with the same key. By examining the repeating result, it is easy for miscreants to crack the WEP secret key, known as an IV attack. To put it in perspective, the attack happens because the algorithm used is RC4, the IV is too small, the IV is static and the IV is part of the RC4 encryption key.

2

In the analogy, the door handle now has the ability to lock (or you can always choose to leave it unlocked as well). It is not a very good lock and anyone who applies enough force can still manage to get the door open, but the security it provides is enough to keep most people out.

WPA
To make the encryption stronger, Temporal Key Integrity Protocol (TKIP) was employed with WEP to create Wi-Fi Protected Access (WPA). This places a 128-bit wrapper around the WEP encryption with a key that is based on such things as the MAC address of your machine and the serial number of the packet. TKIP was designed as a backward-compatible addition to WEP and could use all existing hardware. Without the use of TKIP, WEP is considered weak. It is worth noting, however, that TKIP has been broken.

3

Continuing the analogy, the door handle with the lock now has a "helper" as well. This adds some limited security, but can still be broken by applying a bit more force. While an improvement, it is far from a great solution.

WPA2/802.11i
The main difference between WPA and WPA2 (Wi-Fi Protected Access 2) is that the former implements most -- but not all -- of 802.11i in order to communicate with older wireless cards (which might still need an update through their firmware in order to be compliant) and it used the RC4 encryption algorithm with TKIP. By comparison, WPA2 implements the full standard and is not compatible with older cards. WPA also mandates the use of TKIP, while WPA2 favors Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP). CCMP uses 128-bit AES encryption with a 48-bit initialization vector. With the larger initialization vector, it increases the difficulty in cracking and minimizes the risk of replay. NOTE: The 802.11i standard is often most commonly referenced as WPA2, the name given it by the Wi-Fi Alliance.

4

Finishing the analogy, the door handle now has another lock -- a deadbolt, in this case -- added to assist. This increases the security over the other solutions. While it is still possible for someone whose life-goal is to gain entry to do so (by breaking the glass, driving a Trailblazer through the door, et cetera), it effectively keeps out all but the most committed.

For Exam Purposes
As a simplified timeline useful for exam study, think of WEP as coming first. It was fraught with errors and WPA (with TKIP) was used as an intermediate solution, implementing a portion of the 802.11i standard. The final solution -- a full implementation of the 802.11i standard -- is WPA2 (with CCMP).

Miscellany
Many networks will regularly broadcast their name (known as an "SSID broadcast") to announce their presence. One method of "protecting" the network that is often recommended is to turn off the SSID broadcast. The access point is still there and can still be accessed by those who know of it, but it prevents those who are just scanning from finding it. This should be considered a very weak form of security as there are still other ways, albeit a bit more complicated, to discover the presence of the access point besides the SSID broadcast.

Any wireless access point added to your network that has not been authorized is considered a "rogue." The rogue may be added by an attacker, or could have been innocently added by a user wanting to enhance their environment. The problem with the user doing so is that there is a good chance they will not implement the security you would, and this could open the system up for a man-in-the-middle or "evil twin" attack. An evil twin attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit.

Be sure to change the default settings on all wireless devices. Never assume that a wireless connection is secure. The emissions from a wireless portal may be detectable through walls and for several blocks from the portal. Interception is easy to accomplish, given that RF is the medium used for communication. Newer wireless devices offer data security, and you should use it. You can set newer APs and wireless routers to non-broadcast in addition to configuring WPA2.


Emmett Dulaney is the author of several books on Linux, Unix and certification. He can be reached at .

 


More articles by Emmett Dulaney:

-- advertisement --


There are 7 CertCities.com user Comments for “A Visual Guide to Wireless Security Standards”
Page 1 of 1
4/7/13: Miu Miu Sale from [email protected] says: Can you please send by e-mail me the code for this script or please let know me in detail concerning this script? Miu Miu Sale http://miumiusale.v5s7.com
6/5/13: Neverwinterastraldia from [email protected] says: Neverwinter astral diamonds http://www.astraldiamondsneverwinter.com match the whole thing. Quite strong, nonetheless loathe just how people secure not clean without difficulty.
6/7/13: ?????? ?? from [email protected] says: As a Newbie, I am continuously searching online for articles that can benefit me. Thank you ?????? ?? http://www.tonpo-center.net/shinsailQA.htm
6/30/13: firefall gold from [email protected] says: Top notch firefall gold http://www.4firefall.com
7/20/13: Oakleys Sale from [email protected] says: Who else must I follow? sunglass addicts regarding Twitting Oakleys Sale http://www.replicaoakleysglasses.com
7/22/13: fitflops from [email protected] says: Surfers gives the swagger on shoes fitflops http://www.fitflopsshoesoutlet.com
8/17/13: Mac Makeup For Sale from [email protected] says: Right here is the makeup truths your folks does not want one to know about Mac Makeup For Sale http://www.usa-macmakeupwholesale.com
Your comment about: “A Visual Guide to Wireless Security Standards”
Name: (optional)
Location: (optional)
E-mail Address: (optional)
Comment:
   

-- advertisement (story continued below) --

top