You are on page 1of 28

Chapter 5

Wireless Communication Security


Introduction
• Computer security is the protection of
computer systems and information from
harm, theft, and unauthorized use. It is the
process of preventing and detecting
unauthorized use of your computer
system.

02/08/2022 2
Cont’d…
• Information security is securing information
from unauthorized access, modification &
deletion.
• Computer Security means securing a
standalone machine by keeping it updated and
patched.
• Cybersecurity is defined as protecting
computer systems, which communicate over
the computer networks.
02/08/2022 3
Security terminologies
• Unauthorized access − an unauthorized
access is when someone gains access to a
server, website, or other sensitive data using
someone else's account details.
• Hacker − is a Person who tries and exploits
a computer system for a reason which can be
money, a social cause, fun etc.
• Threat − is an action or event that might
compromise the security.
02/08/2022 4
Cont’d…
• Vulnerability − it is a weakness, a design
problem or implementation error in a system
that can lead to an unexpected and undesirable
event regarding security system.
• Attack − is an action on the system security that
is delivered by a person or a machine to a
system. It violates security.
• Antivirus or Antimalware − is a software that
operates on different OS which is used to
prevent from malicious software.
02/08/2022 5
Cont’d…
• Social Engineering − Is a technique that a
hacker uses to stole data by a person for
different purposes by psychological
manipulation combined with social scenes.
• Virus − It is a malicious software that
installs on your computer without your
consent for a bad purpose.
• Firewall − It is a software or hardware
which is used to filter network traffic based
02/08/2022 on rules. 6
Cont’d…

02/08/2022 7
Cont’d…

02/08/2022 8
Security goals
1. Confidentiality:
• Confidentiality ensures that computer-related
assets are accessed only by authorized parties.
• That is, only those who should have access to
something will actually get that access.
• Confidentiality is sometimes called secrecy or
privacy.

02/08/2022 9
Cont’d…
2. Integrity
 Integrity means that assets can be modified only
by authorized parties or only in authorized ways.
 In this context, modification includes writing,
changing, changing status, deleting, and creating.

02/08/2022 10
Cont’d…
3. Availability
 Availability means that assets are accessible to
authorized parties at appropriate times.
 In other words, if a person or a system has
legitimate access to a particular set of objects,
that access should not be prevented.
 For this reason, availability is sometimes known
by its opposite, denial of service.

02/08/2022 11
Cybersecurity

02/08/2022 12
Cont’d…
• Cyber security is a potential activity by which
information and other communication systems
are protected from and/or defended against the
unauthorized use or modification or exploitation
or even theft.
• Cyber security is a well-designed technique to
protect computers, networks, different programs,
personal data, etc., from unauthorized access.

02/08/2022 13
Cont’d…
• Security Architecture
• Network Diagram
• Security Assessment Procedure
• Security Policies
• Risk Management Policy
• Backup and Restore Procedures
• Disaster Recovery Plan
• Risk Assessment Procedures

02/08/2022 14
IP Security (IPSec)
• It is sets of protocols that allow secure
communicate between two computer over an
unsecured network.
• IPSec goal:
– To protect IP packets.
– Providing defense against network attack.
• IPSec secure network traffic by using
– Encryption
– Data signing
02/08/2022 15
Cont’d…
• IPSec protects your private network from
internet attacks through end-to-end
security.
• IPSec Components:
– Encapsulating security (ES): provides
confidentiality, authentication and
integrity.
– Authentication Header (AH): provides
02/08/2022
authentication and integrity. 16
Cont’d…
– Internet Key Exchange (IKE): provides
key management and security
association(SA) and management.

02/08/2022 17
Firewalls

02/08/2022 18
Cont’d…
 A firewall is a system designed to prevent
unauthorized access to or from a private
network. You can implement a firewall in
either hardware or software form, or a
combination of both.
 Firewalls prevent unauthorized internet users
from accessing private networks connected to
the internet, especially intranets.

02/08/2022 19
Cont’d…
 All messages entering or leaving the intranet
(the local network to which you are
connected) must pass through the firewall,
which examines each message and blocks
those that do not meet the specified security
criteria.

02/08/2022 20
Cont’d…
 Packet filtering: The system examines
each packet entering or leaving the network
and accepts or rejects is based on user-
defined rules. Packet filtering is fairly effective
and transparent to users, but it is difficult to
configure. In addition, it is susceptible to IP
spoofing.

02/08/2022 21
Virtual private network
 VPN stands for virtual private network. A
virtual private network (VPN) is a technology
that creates a safe and encrypted connection
over a less secure network, such as the
internet.

02/08/2022 22
Cont’d…
 Virtual Private network is a way to extend a
private network using a public network such
as internet. The name only suggests that it is
Virtual “private network” i.e. user can be the
part of local network sitting at a remote
location. It makes use of tunneling protocols
to establish a secure connection.

02/08/2022 23
Cont’d…
• Virtual Private Network (VPN) is basically of 2
types:
– Remote Access VPN: Remote Access VPN
permits a user to connect to a private network
and access all its services and resources
remotely. The connection between the user
and the private network occurs through the
Internet and the connection is secure and
private. Remote Access VPN is useful for home
users and business users both.
02/08/2022 24
Cont’d…
• An employee of a company, while he/she is out of
station, uses a VPN to connect to his/her
company’s private network and remotely access
files and resources on the private network.
Private users or home users of VPN, primarily use
VPN services to bypass regional restrictions on
the Internet and access blocked websites. Users
aware of Internet security also use VPN services
to enhance their Internet security and privacy.

02/08/2022 25
Cont’d…
– Site to Site VPN: A Site-to-Site VPN is also
called as Router-to-Router VPN and is
commonly used in the large companies.
Companies or organizations, with branch
offices in different locations, use Site-to-site
VPN to connect the network of one office
location to the network at another office
location.

02/08/2022 26
Cont’d…
• Intranet based VPN: When several offices of the
same company are connected using Site-to-Site VPN
type, it is called as Intranet based VPN.
• Extranet based VPN: When companies use Site-to-
site VPN type to connect to the office of another
company, it is called as Extranet based VPN.

02/08/2022 27
Thank you

You might also like