izpis_h1_title_alt

Zagotavljanje varnosti v brezžičnih poslovnih omrežjih
ID Budna, Aleš (Author), ID Pustišek, Matevž (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,20 MB)
MD5: FE8F7F1969AE1C57E4D4FEC2C5D485ED
PID: 20.500.12556/rul/e51fca8a-2e5d-4d51-9051-a13909432e82

Abstract
Uvajanje brezžičnih 802.11 omrežij v poslovnih okoljih prinese številne prednosti pa tudi varnostne grožnje. Brezžično omrežje je vstopna točka v poslovno omrežje, zato je potrebno preprečiti ogrožanje podatkov in storitev, ter zagotoviti dostop samo legitimnim uporabnikom. Poslovno omrežje je lahko ogroženo, še preden je vzpostavljeno brezžično omrežje. Razlog je lahko čisto nenameren, ko si želi zaposleni olajšati dostop do poslovnega omrežja z nelegalno dostopovno točko ali ko na prenosniku, ki je priključen na poslovno omrežje istočasno vzpostavi direktno ad hóc omrežje z namenom izmenjave podatkov. Zaradi narave medija je brezžično 802.11 omrežje že samo po sebi nevarno, saj je medij deljen, radijski valovi se prosto širijo in vsaka naprava, ki je na istem frekvenčnem kanalu, lahko prisluškuje komunikaciji. Prisluškovanje omrežju je lahko izvedeno iz precejšnje razdalje, popolnoma neopazno, tako pridobljeni podatki in podatki pridobljeni z socialnim inženiringom, pa so osnova za vdor v poslovno omrežje, napad za zavrnitev storitev ali za prestrezanje želenih informacij. Varnost v brezžičnih poslovnih omrežjih zato zahteva bolj kompleksno načrtovanje in vpeljavo varnostnih rešitev, ki so drugačne, kot tiste, ki so uveljavljene v domačih brezžičnih omrežjih. Celovit koncept varnosti brezžičnega poslovnega omrežja zajema pet osnovnih komponent: zaupnost podatkov, AAA, segmentacijo prometa, nadzor za zaščito pred napadi in varnostno politiko. Avtentikacijo uporabnikove identitete zagotavljamo z močno 802.1X/EAP avtentikacijsko metodo, ki vzpostavi šifriran TLS tunel med uporabnikom in avtentikacijskim strežnikom, za izmenjavo identifikacijskih poverilnic. Stranski produkt procesa avtentikacije je generacija in distribucija dinamičnih šifrirnih ključev, s katerimi se šifrira podatkovni promet in zagotovi zaupnost podatkov. Ko je uporabnik uspešno avtenticiran in se mu dodelijo omrežni viri lahko z VLAN-i ločimo uporabniški promet v omrežju in na ta način še omejimo dostop uporabnika do določenih virov ali omrežij. Segmentacija je lahko še prepletena s kontrolo dostopa, ki temelji na vlogi uporabnika. S temi mehanizmi smo dosegli zasebnost podatkov in zaščito omrežnih virov, vendar je še vedno potreben neprestan nadzor za zaščito pred morebitnimi napadi za kar poskrbi naprava za zaznavanje in preprečevanje vdorov. Temelj zaščite brezžičnega omrežja predstavlja varnostna politika, ki oceni potencialna tveganja in grožnje, definira komponente zaščite, ukrepe, ki se bodo izvajali ter izvajalce. Šele konsistentno izvajanje, kontrola nad izvajanjem in zavedanje vseh vpletenih zagotavlja varno brezžično poslovno omrežje.

Language:Slovenian
Keywords:802.11 WLAN, dostopovna točka, avtentikacijske metode, šifriranje, segmentacija omrežij, WIDS, WIPS, varnostna politika
Work type:Undergraduate thesis
Organization:FE - Faculty of Electrical Engineering
Year:2016
PID:20.500.12556/RUL-83212 This link opens in a new window
Publication date in RUL:07.06.2016
Views:2014
Downloads:516
Metadata:XML DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Ensuring the security of wireless business networks
Abstract:
Deployment of 802.11 wireless networks in business environments bring many benefits as well as security threats. Wireless network is a gateway to the enterprise network, therefor it is necessary to prevent jeopardizing data and services, and provide access to legitimate users only. Enterprise network can be compromised even before the establishment of the wireless network. The reason may be purely accidental, when an employee wants to facilitate access to the enterprise network thought illegal access point, or when a notebook is connected to the enterprise network and at the same time establishes a direct ad-hoc network to exchange data. Due to the nature of the medium, wireless 802.11 network is itself dangerous. Because it is a shared medium, radio waves are freely propagated and any device that is on the same frequency channel may be eavesdropping on communications. Eavesdropping the network can be made from a considerable distance, completely unnoticed, the data obtained in this way and the data obtained through social engineering are the basis for the invasion of the corporate network, attack for denial of service or to intercept the desired information. Security in wireless business networks therefore requires a more complex design and implementation of security solutions that are different from those that are established in the domestic wireless networks. Comprehensive concept of security of wireless enterprise network includes five basic components: confidentiality, AAA (Authentication, Authorization, and Accounting), segmentation of the traffic, control to protect from attacks and security policy. Authentication of the identity of the user is ensured by a strong 802.1X/EAP authentication method, which creates an encrypted TLS tunnel between the user and the authentication server for sharing identity credentials. A by-product of the process of authentication is the generation and distribution of dynamic encryption key, which encrypts data traffic and ensures the confidentiality of data. Once a user is successfully authenticated and his network resources allocated, we can, with VLANs separate user traffic on the network and in this way limit user access to certain resources or networks. Segmentation can still be interlaced with access control based on user role. With these mechanisms, we achieved data privacy and network resources protection, but it still requires constant supervision to protect from potential attacks, enabled by the device to detect and prevent intrusions. The cornerstone of wireless network security represents the security policy to assess the potential risks and threats, defines the components of protection, measures to be implemented and the performers. Only consistent implementation, control over the implementation and awareness of all involved, provides secure wireless business network.

Keywords:802.11 WLAN, access point, authentication methods, encryption, network segmentation, WIDS, WIPS, security policy

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back