Time
31 hours 29 minutes
Difficulty
Beginner
CEU/CPE
30

Video Description

A History of Implementing WiFi Security Measures This lesson covers background knowledge in implementing wireless security measures. The most important aspect in creating a secure wireless network is encryption. Wireless encryption prevents a wireless network from being open to everyone. When encrypting, make sure the data that is being sent over the network is not in clear text, that it is encrypted so it stays secure. The original encryption protocol was Wireless Equivalency Protocol (WEP) and it was easily broken and it is not recommended. WiFi protected access (WPA) replaced WEP and used Temporal Key Integrity Protocol (TKIP) to encrypt data and was able to provide mid-level security but it can still be cracked. WPA gave way to WPA2 and uses the advanced encryption standard. WPA2 is approved in the USA for top secret level data trans-versing a network and is the standard used today. Wireless Protection Security (WPS) is the latest trend and allows for easy connection at the press of a button on a device but it is easily broken as WPS enabled routers do not use a very long encryption key.

Video Transcription

00:04
Hi and welcome to Cyber Bury. My name's Anthony and I'm your local subject matter expert for Network Plus, and today we're gonna be talking about implementing appropriate wireless security measures. So in today's day and age of mobile computing in laptops and BlackBerries and other smartphone devices that can connect wirelessly to network, the
00:24
wireless has sort of become are a new gateway into our network that
00:29
wasn't there before we used to. When we were just managing the security of our wired in cable connections. It was a bit easier to manage who was allowed and who wasn't allowed to connect into our network if someone did not have a physical connection into our network or wasn't able to actually come in and
00:47
attack the computers and our network over the Internet,
00:50
if we made sure all of our computers were secure. But Major, all of our servers were secure, and we made sure that no one physically connected into our network then our network was good.
00:59
With the advent of wireless, however, and with wireless integration into our different networks, we've now opened a new portal into a new potential security portal into our network that people can try to break into sitting in the parking lot. So we need to help make sure. And we need to understand how we can secure our wireless networks so that we not only keep our
01:19
WiFi secure,
01:19
but also so we keep the rest of our network and the rest of our computers and servers secure as well. Probably the most important aspect of securing our wireless connection is going to be all wireless encryption. Now our wireless encryption is going to prevent our wireless from being an open wireless connection.
01:37
An open wireless connection is essentially a WiFi that is unsecured. Anyone can connect into this wireless connection
01:42
and can just go on our network.
01:46
An encrypted wireless connection. However, make sure that all of the data that is being that is being traversed over our network is encrypted. It's not in clear text, and people can't just connect into our wireless just from the open. They need to know. I appreciate it key
02:02
where they need to have some sort of radius. They need to have some sort of
02:07
account within our network. They need to have maybe someone's they need to steal a smartcard or they need to be using a company computer in order to connect into our wireless.
02:17
So this encryption is a very, very important part of securing a wireless connection.
02:23
Now the original wireless encryption protocol was wept.
02:28
Webb stands for Wired equivalency protocol, and again, it was the original security protocol utilized a pre shared key, which is a key that you give out to everybody and say, This is the key that you type in to connect to our network.
02:44
But we don't use it as much anymore, and it is not recommended at all because it is very easily broken. There is a innate security flaw. There's an innate flaw in the mathematical on the encryption protocol within wept that very easily allows wet.
03:01
The Web encrypted the Web shared, keyed, appreciated key
03:06
to be derived just from capturing different packets.
03:09
So if someone can connect, take a laptop, throw open a wire, a capture program and simply sit there and just capture packets that are going on that are traversing our network. Capture the office. Capture some of the authentication handshake packets that air traversing our network
03:29
after they captured enough. It is very easy and very quick for them just to
03:32
*** just to crack the crack the encryption method and then crack and get the pre shared key so they can connect to our wireless. So Webb is not it all recommended because it is very easily broken.
03:49
Oh, pretty much any security researcher penetration tester or cracker trying to malicious attack or trying to crack into your network worth their salt will understand and will know how to crack. A Web encryption protocol will understand how to derive the pre sharqi
04:09
from
04:11
the weapon Krypton Wireless Protocol, WEP encrypted wireless access points So it is not at all recommended. It's
04:17
don't use what,
04:19
um
04:20
W p. A was a temporary enhancement over wept a soon as it was realized how weak wept truly. Waas w P. A. Was sort of a scrambled and a temporary enhancement to get something that was better than something that wasn't is easily broken and didn't have that innate security flaw.
04:39
Oh, and W. P. A. Stands for WiFi protected access
04:42
uses tea kip
04:44
temporarily Temple Temple, key integrity protocol in order to encrypt the connection or to encrypt the packets on dis sort of a mid level security dbp a still has the ability to be cracked. It
04:59
takes longer, and it requires more packets to be captured and analyzed. Then think than a very easily broken wept encryption. But it is a mid level security. But again,
05:11
W p. A is not recommended because we have a W p a to the p p a. To stands for WiFi protected access to,
05:19
and it allows us to use the 802.11 standard, and it uses a yes and advanced encryption standard Cryptography in order to encrypt our packets, encrypt our appreciate key.
05:32
Now W p A. To is approved for in the United States is approved for top secret level. Top secret level data traversing a network w p A. To encryption standard on an access point is approved for that. Now, the access point itself may need to be approved for top secret,
05:50
but the W P. A. To standard is approved for top secret data communications.
05:56
Um,
05:57
W P A. To does not just use may not just use appreciate key. You can set up W P A to protected access points just to use appreciated key. But you can also set up W P. A. To protected access points to use authentication through a radius server,
06:15
which we'll talk about in a later module
06:16
we can use weaken. Essentially use active directory we could use. Use your accounts of the person who's active, who's actually logged into the computer in order to in order to access a W p A. To encrypted access point.
06:31
So rather than handing out appreciated key to everybody, which could very easily be written, written on a sticky note and then lost in the trash,
06:39
someone go dumpster diving and find our sticky note and say, Okay, here's the WiFi password. Rather than doing that, we could set up our W P A two acts encrypted access point to authenticate based on user log ins. So the user that's the domain user that's logged into the computer
06:57
when they try to connect to the access point is going to authenticate them based on their
07:00
already established user name and password, which in which, in the domain environment would be a lot a lot more security securely sound using that type of authentication rather than appreciated key.
07:15
Now we also have down here, and it's down here for reason W P s
07:21
now Debbie P s stands for WiFi protected security.
07:27
And it's
07:29
newly. It's sort of newly trending, sort of a new thing that you can get on wireless access points or all you have to do is you press a button on the wireless on the wireless access point and you press the button on the device and they synchronise at the same time, and they send a short security code to each other and you're connected.
07:46
You don't have to bother with entering a long appreciated key or
07:50
bother with all this other long encryption method. All you have to do is press the button and you're easily connected.
07:56
Now,
07:58
the upside for W. P s. What W. P s does have going for it is that it is easy. All you have to do is you just press the button and you press the button on the device and their authenticated.
08:07
The downside to W. P S is it is
08:11
very insecure. Um, it's it can be broken by the simple fact that W. P s enabled routers do have essentially the key that they're using is not along a super long encryption pre shared key. The key that they're using is a
08:31
very short key,
08:33
which can essentially, we can have an attacking computer which can just generate through all of these different these different keys that it could possibly be iterated through. All these different potential possibilities
08:46
hits the one that the water the router is using and then connects into the router,
08:50
our connection to the wireless access point.
08:54
So it's a little bit more complicated than that. There's a little bit more going on going on behind the scenes in that, but that's, ah, little bit more advanced security researching topic. But all we need to know for right here is that
09:07
just because W. P s is simple doesn't mean it's secure. DPS is actually very, very, fairly insecure. So
09:18
make sure that when you're setting up about wireless access point in your network, you may wanna watch out for wireless access points that claim that there w p s enabled or they have the ability to you have you can easily connect to this wireless access point because even if you turn it off, the W P s capability is still there. Inside that wireless access point,
09:37
you need to be careful with
09:37
when you're choosing your wireless access points that you may want depending on your environment. If you're just planning on using w p A. To and authenticating with user accounts, you may want to avoid wireless access points that have W. P s get a BP escape of the capability at all.

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC
Instructor