I have discussions needing to get completed

I have discussions needing to be done. 

Week 1 Discussion

Don't use plagiarized sources. Get Your Custom Essay on
I have discussions needing to get completed
Just from $13/Page
Order Essay

As a security professional would you allow implementing IoT devices in the workplace?

(Read about Mirai Botnet and how to secure IoT devices)

CBY 461 Wk 2 Discussion

Write a BYOD security policy for a medium size company.

CYB 461 Week 3 Discussion

Read the attached document and provide security points that could be implemented by home users.

This is the attached reading for this discussion

WIRELESS NETWORKS: Security Problems and Solutions Jonathan Weiss GSEC Practical Assignment v1.4 © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 2 of 11 Abstract The need for security on any network is apparent: the prevention of eavesdropping and the desire for authentication has been the main focus of many network administrators. However, the problems that already exist are added to when you add wireless networking to the equation. As wireless networking becomes more popular, the flawed security of most of those networks becomes more apparent. Several organizations have devised ways to secure their wireless networks from intruders. However, there is currently no wireless security implementation that everyone agrees is always suitable, regardless of what network it is to be used on. Some implementations are satisfactory for some environments, and there is work underway to create future solutions. Meanwhile, some wireless users make the situation more difficult as they advertise existing vulnerable networks. Eavesdropping and Authentication The security of any network is an important issue. No one likes the idea that the possibility exists that someone could be intercepting their Internet traffic, reading their email, ordering items with their credit cards, or sending inappropriate messages to their boss in their name. Security of wired networks is often a primary objective of system administrators. When considering a network with a Wireless Access Point, or “WAP”, available, new security concerns come into play. Because wireless is broadcast in nature, anyone within range of a wireless card can intercept the packets being sent out without interrupting the flow of data between wireless card and base station. It is because of this that wireless network security is somewhat more concentrated than that of wired networks. Network administrators with WAP’s tend to focus on the security between the wireless card and the base station. After packets leave the base station on the wired side, administrators can rely on more conventional security features already in place on their wired networks to protect the information in question. There are two main issues that wireless security solutions tend to address. First, since all wireless packets are available to anyone who listens, security is needed to prevent eavesdropping. Since it is impossible to physically keep people away from the WAP’s, short of erecting a fence around your building, solutions tend to rely on encryption in one form or another. Depending on what is implemented, this can include a static shared key, a key generated from a static key, a dynamically-generated key, or negotiated keys. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 3 of 11 The second issue is authentication. With a wired network, a system administrator might determine who generated certain traffic based on the physical port that the traffic came in on. By assuming that inbound traffic on a particular port is always coming from a certain source, there is no need to constantly verify where the traffic was coming from. However, with wireless networking, many users can access the network at the same access point, making it more difficult to map who did what. It is often desirable, therefore, to allow users to identify who they are before letting them through the base station onto the rest of the network. This prevents unauthorized usage while having the added bonus of being able to track a particular user’s activity should the need arise. When considering a security solution for your wireless network, it is important to keep these issues in mind. However, for various reasons, it isn’t always possible to get a total solution for your network. WEP and the Small Network The idea of a no-wires network is becoming more appealing to home and small office users every day. The cost of such connectivity, as opposed to paying someone to install Category 5e cable in your house wherever you think you might want to use your laptop, is decreasing every day. “With the huge volume of cards being offered by close to 100 vendors, prices have plummeted to sub- $100 for notebook cards, and as low as $150 for access points.”1 Bandwidth is also becoming less of an issue. 2.4GHz 802.11b wireless can provide 11Mbps of data, while 5GHz 802.11a wireless, for an added price, can provide up to 54 Mbps, more than enough to take full advantage of a cable modem or DSL connection. In terms of security, it is these ad-hoc networks which most often provide the easiest access to outsiders. The main problem is the cost of security. A large company with a large number of people using the network can afford to purchase appropriate security equipment, and to pay someone to secure their network and maintain that security. A home or small office user, on the other hand, will most often rely on inexpensive security measures. A $6.000 wireless security gateway and a RADIUS server, for example would probably not be cost-effective for a small office. More often than not, the small-network wireless user will utilize only whatever security features are advertised on the box of the wireless products they purchase. Because it is part of the 802.11 specification, a security feature known as Wired Equivalent Privacy (WEP), is available with most base stations sold today. An encrypted key is associated with each network; anyone who wants to 1 Ellison. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 4 of 11 use the network must have that key. Many people rely on WEP to prevent their packets from being sniffed and to prevent outsiders from joining their network without their knowledge. However, WEP is by no means secure. An experienced wireless hacker has a wide variety of attacks with which to circumvent WEP. In most cases, this involves listening in on broadcasted wireless packets and breaking the encryption key. “Statistical attacks become increasing practical as more ciphertexts that use the same key stream are known.”2 One of many free programs available to accomplish this is AirSnort. “AirSnort requires approximately 5-10 million encrypted packets to be gathered. Once enough packets have been gathered, AirSnort can guess the encryption password in under a second.”3 Once that is accomplished, it is no trouble to join the network in question. WEP also falls short in other areas. The use of WEP can have a significant impact on your throughput, as opposed to having no such encryption. “Most generally-available wireless hardware loses significant bandwidth (up to 40%, in some tests) when encrypting traffic in hardware.”4 In addition, because each network shares a single encrypted key, you are only protecting your network from an outsider from eavesdropping on your network, not users from listening in on each other. Larger Wireless Environments Putting aside the fact that WEP is not as secure as it claims to be, it is currently unsuitable for larger environments. Most system administrators prefer authentication schemes which allow them to determine which users were doing what at a certain time. It is also often desirable to allow users to be independently protected from one another with unique, separate encryption keys. There are a number of security implementations beyond WEP which try to solve these problems, although some network administrators would prefer less or no security. Some network administrators can’t be bothered with the expense and the work required to monitor their network from intruders. If given a choice between having a network up with no security or not having a network up at all, they would chose the former. An example of such an environment is Columbia University’s Wireless Network. Essentially, anyone can configure their wireless card for DHCP, put their wireless device within range of a base station, and start using Columbia’s network services. They have no way to track someone engaging in 2 Borisov, Goldberg, and Wagner. 3 AirSnort Homepage. 4 McGrew. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 5 of 11 illegal activities on their network; while MAC addresses might be logged, those addresses are not mapped to any kind of user identification. Some Internet cafés and airports also allow such service for their customers, although more of these networks are implementing security measures. Some organizations use static addressing for their security. Users are assigned a static IP by a central authority. Since it’s easy enough to change your IP to use someone else’s, that central authority might also log MAC addresses of users’ wireless cards. A security mechanism residing at the base stations or at the firewall checks to see if a MAC address being used is associated with the static IP assigned to that address. If there is a match, traffic is free to pass through onto the network; otherwise, it is rejected. A similar concept is the use of a DHCP reservation. Again, a central authority is responsible for keeping track of MAC addresses. When your MAC address is seen on the network, you are either granted or denied an IP via DHCP. The IP can be assigned only for use by you, or can come from a reserved pool of addresses. The use of both these methods is generally not viewed as acceptable methods of authentication. For one thing, it is little trouble for someone to listen for your wireless traffic, pick up your IP address, and pretend to be you. With little additional effort, the MAC address of many wireless cards can be changed. An intruder can learn your MAC address from your transmissions, change their address to match yours, and get an IP whenever they wish. In addition, neither of these methods does anything to solve the problem of preventing eavesdropping. Another method of wireless authentication, developed by Rutgers University’s Department of Computer and Information Sciences, is known as “Archipelago Wireless”. Archipelago Wireless offers authentication before you get to connect to anything. All base stations route requests through a central firewall which sits between the base stations and the rest of the network. Users open a browser and go to the network’s login page; attempts to open any other page are redirected to the login page, while other connections are denied. Once on the SSLprotected login site, users are given the opportunity to authenticate against a RADIUS server. If authentication is successful, their traffic is allowed to pass through to the rest of the network. The firewall queries their wireless card every few minutes to make sure that the connection is still alive. The concept used by the Wireless Archipelago is almost identical to what is being implemented by T-Mobile Hotspot, a service to be installed in 1,200 coffee shops owned by the Starbucks Corporation by the end of 2002. For a small fee – “…an unlimited-use account in one city costs $29.99 a month…”5 – users can 5 Chan. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 6 of 11 connect when within range of an equipped shop. While the DCIS’s goal was to make the network available to those with appropriate access, Starbucks is primarily interested with having registration and accountability for billing purposes. While the problem of accountability has been well addressed by Archipelago Wireless, it does not address the problem of eavesdropping prevention. However, networks with this type of setup are designed to with other security features, not to replace them. The use of SSH for login sessions and SSL for email reading is recommended, while the use of a VPN is possible for protecting all traffic. VPN servers can be configured to use their existing methods to implement authentication. Relying on a VPN for wireless security, however, has its own problems. For starters, you have to have a way to deploy the appropriate VPN client to your users. While it might be possible to post connection information around campus, it would be a bit more difficult and more costly to have boxes with VPN client CD’s. You might make this client software available on your network web site, but users would have to be on the network to download it. Second, the VPN client you chose may not be compatible with or available for all operating systems used by those who wish to access your network. This problem becomes less apparent in a homogeneous environment, such as a corporation, where system administrators can expect their users to only have certain kinds of wireless devices. There is also the issue of VPN’s being a drain on bandwidth. Bluesocket, Inc., offers a solution which is a combination of Archipelago Wireless and VPN server in one box. Their gateways similarly ask users to authenticate on a login page, which can be directed to call upon a secondary authentication server. In addition, Bluesocket adds VPN security over IPSec, a security protocol considered by most to be more secure than WEP. While not all operating systems have compatible IPSec clients built in or available, the number of operating systems that do have IPSec is going up. Bluesocket’s security does come at a price: a firewall for 100 users costs around $6000. Cisco’s Aironet wireless cards and base stations take advantage of a number of security features which answer a lot of authentication and encryption questions. Aironet uses an authentication scheme based on Extensible Authentication Protocol (EAP). Known as EAP-Cisco Wireless, or “LEAP,” this scheme “provides user-based authentication and centralized key management and distribution.”6 First, the user enters their username and password into the client adaptor. This information is sent from the WAP to a compatible RADIUS server for authentication. The server and client then negotiate a dynamic, sessionbased WEP key based on a one-way hash of a known secret. This key is set to 6 “Cisco Wireless LAN Security Bulletin on WEP Weakness.” © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 7 of 11 expire a regular intervals, making it harder for sniffers to discover the key before it becomes invalid. While few non-Cisco products currently take advantage of LEAP, Apple’s AirPort base stations and wireless cards are compatible. War Driving and War Chalking As wireless networking becomes increasingly popular, more and more people are looking for places they can pick up wireless Internet access. As was mentioned earlier, wireless networking is broadcast in nature, which means that wireless transmissions can be picked up by anyone within range of a base station, whether the owner of that base station knows about them or not. Once this was realized, wireless owners started a trend known as “war driving”, the ongoing search for vulnerable access points where they might plug in and access unsecured networks. “War driving is the updated version of ‘war dialing’ – popularized in the 1980’s by the movie War Games – in which a PC dials number after number attempting to locate other modems.”7 The idea behind war driving is similar: find out what networks are available to you and then attempt to access them. War driving primarily involves driving around with suitable antennae and software and looking for vulnerable access points. There are a surprisingly large number of web sites that will identify the software necessary and give explanations on how to do this. Free software, such as NetStumbler, is designed to pick up wireless networks. Once a wireless signal is identified, NetStumbler logs all available information one might need to get into that network later. Although war driving can be successfully accomplished with an out-of-the-box wireless card and little else, a more enthusiastic war driver can learn how to purchase and install a bigger, more sophisticated antennae to pick up more signals. It is also common for war drivers to bring along GPS equipment to map their findings for later use. Once you find an access point, it is then little trouble to join that network. Using NetStumbler combined with a program such as AirSnort, it is not difficult for any war dialer to compromise any wireless network using either no security or only WEP security. As mentioned earlier, a large number of ad-hoc networks fall into this category. More often than not, long war driving expeditions turn up a greater percentage of unsecured networks as opposed to secure ones. Web sites which mention how to participate in war driving are usually not intent on hacking into other networks, but rather to prove that it can be done. “While casual ‘war drivers’ – individuals who hang around outside companies and look for untended wireless connections – may not get to see your WEP-encrypted 7 Santalesa. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 8 of 11 data, anyone bent on corporate espionage probably can.”8 Whether the information gathered is intended for the interested wireless user or someone with malicious intent, the effect is the same: vulnerable networks are advertised to the world. These sites often log the data of other war dialers, making it easy for anyone to easily find vulnerable networks without doing any work. In effect, someone who wants to use an Internet connection without being accountable for their actions needs only to find an appropriate war driving site with a map of their local area marking where vulnerable WAP’s are located, then get information from that same site on how to compromise the network’s security features. War dialers who wish to leave tracks for those who follow can learn about something called “war chalking”. Similar to a written language often used by hobos to indicate where others might find a hot meal and good place to stay, war chalkers who find an accessible base station can leave their mark nearby with appropriate access information. This information usually includes the SSID of the network, the security status of the network, and signal strength. War chalkers who see the familiar markings are not only saved the trouble of looking for accessible WAP’s in a particular spot, but are also informed if a particular network is secured. Not only are vulnerable WAP’s frequently logged on web sites for anyone to find, but anyone who knows what the marks mean is instantly informed of an access point without even having to turn their wireless devices on. Future Solutions As the number of wireless networks increases, the need for security increases. As discussed, current security features are either ineffective, costly, or nonUniversal. Home users want something they can figure out that works without having to purchase anything extra. Network administrators also consider cost, but their primary concern has to be making the network available to most of their users while still offering authentication and protection from intruders. IEEE’s 802.11 Task Group I decided recently to move away from WEP and WEP2. WEP2, with its sliding window implementation and stronger encryption keys, “improves on WEP but doesn’t completely address the need for easy, strong encryption.”9 Instead, they agree that additional authentication from a secondary source, such as a RADIUS or Kerberos server, is the direction they want to go. Future versions of WEP will most likely include per-session key negotiation. It is also possible that WEP could develop into something more like SSL, which relies on a certificate authority for key exchange. At present, several encryption solutions ask users to sacrifice throughput for security. With bandwidth becoming more available to wireless users as 5GHz become widespread, the use of longer keys with longer shared secrets may soon 8 Schlesinger. 9 Santalesa. © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 9 of 11 become a solution. While too much throughput is sacrificed for a VPN over 802.11b networks, 5GHz 802.11a networks leave you plenty of bandwidth for VPN security solutions to operate without cutting too deeply into transfers. In addition, over time, VPN clients will become available for more platforms, making WLAN’s with VPN landing pads for authentication more accessible. Many agree that the concept of a security gateway between your base stations and the rest of your network is the best way to go. Future gateway solutions will probably also be based on concepts similar to Archipelago Wireless, where authentication is available without having to download and install a proprietary interface. Wireless users can talk to the base stations but can not get past the security gateway without some kind of acceptable authentication. Future versions of IPSec may be more universal, which would allow a security gateway to maintain a client-free IPSec session between the wireless client and the gateway to protect transmissions. Conclusions At present, there is no perfect security solution. The only environment that can be confidently secured is one where all machines are nearly identical. For example, a system administrator would have fewer problems implementing an IPSec solution if all computers that wanted to access the network were using an operating system with a compliant IPSec client. A VPN solution becomes acceptable if everyone on the network can be handed a fully-compatible VPN client that works on their pre-arranged operating system. Most security solutions fall short when the solution has to accommodate too many types of possible clients. Then there is the issue of cost. Many ad-hoc wireless networks are set up instead of having a wired network to avoid the cost of wiring the building or buildings where the network will be used. The price of purchasing additional hardware and software for security puts many solutions out of reach. The free solutions, which frequently implement WEP, are inadequate and give a false sense of security. If the threat of someone reading your traffic or using your network without your permission weren’t enough, an increasing number of people out there have made it their goal to discover and expose vulnerable wireless networks. The number of war dialer maps on the Internet increases every day, as does the number of vulnerable networks as the cost of wireless equipment goes down. Whether or not these web sites are designed with the idea of promoting unauthorized activity, someone intent on getting into your network certainly can use the information found on these sites for compromising your network. As bandwidth limitations and encryption algorithms improve, so will wireless security. It is only a matter of time before someone comes up with a method of © SANS Institute 2002, Author retains full rights. Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 © SANS Institute 2002, As part of the Information Security Reading Room. Author retains full rights. JMW • Page 10 of 11 providing authenticated access and protected transmission, to the point where wireless security is as the same pace as wired security. Until then, network administrators will have to weigh the pros and cons of every solution available, and hope that they can get their security in place before their network is posted on a war dialing web site as a good place to access the Internet.

CYB 461 Week 4 Discussion

In your professional opinion provide the Pros and Cons of wireless charging.

Achiever Essays
Calculate your paper price
Pages (550 words)
Approximate price: -

Why Work with Us

Top Quality and Well-Researched Papers

We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.

Professional and Experienced Academic Writers

We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.

Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code RESEARCH