Business Data Networks and Telecommunications, 8th Edition
1
Chapters 1–4: Introductory material
Chapters 5–6: Switched networks
Chapter 7: 802.11 standards and operation
Chapter 8: 802.11 security, 802.11 management, other local wireless technologies, and cellular technologies
Chapter 8
Chapters 9–10: Internetworking
Panko and Panko
Business Data Networks and Telecommunications, 8th Edition
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 11: Applications
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
2
802.11 Security
Drive-By Hackers
◦ Sit outside the corporate premises and read network traffic
802.11 LAN management
◦ Can send malicious traffic into the network
◦ Easily done with readily downloadable software
Other local wireless technologies
War Drivers
◦ Merely discover unprotected access points— become drive-by hackers only if they break in
Cellular technology
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
◦ War driving per se is not illegal
3
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
Unprotected Access Points
Rogue Access Points
◦ Drive by hackers can associate with any unprotected access point.
◦ Unauthorized access points that are set up by a department or an individual
◦ They gain access to the local area network without going through the site firewall.
4
◦ Often have very poor security, making drive-by hacking easier
◦ Often operate at high power, attracting many hosts to their low-security service
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
5
© 2011 Pearson Education, Inc. Publishing as Prentice Hall
© 2011 Pearson Education. Doing business as Prentice-Hall
6
Panko and Panko
Business Data Networks and Telecommunications, 8th Edition
Core security protocols protect communication between a wireless client and a legitimate access point.
They provide