marți, 22 octombrie 2013

Threats to wireless network access - Business - Small Business

The following are a list of common threats to wireless network access:The base threat that wireless network access systems must deter is unauthorizednetwork access. If the network requires users to have an account, unauthorized networkaccess occurs when a terminal cannot prove that it has an account. If the network allowsaccess to any terminal that can prove ability to pay, unauthorized network access occurswhen the terminal cannot provide proof of ability to pay, yet it nevertheless managesto obtain access to the network.If the network offers different kinds of service, another threat occurs if a terminalauthorized for a lower class of service is able to obtain access to a higher class ofservice without authorization.Once an authorized terminal has gained access to its allowable class of service, an attacker could attempt to steal the session and thereby obtain network access even though the attacker is not authorized, or the attacker could attempt to upgrade service with out authorization by hijacking the authorized session. In order to do this, the attacker would have to spoof the authorized terminal, so this is a kindof attack.

An eavesdropper could intercept the on the air and extract information from the that could harm theuser, or drop the denying service to the terminal.

While most of the threats above derive from an attacking terminal, there is also a threat from the network side. An attacker could set up a rogue access point or base station, and thereby spoof a legitimate terminal into connecting. The rogue access point couldthen examine and conduct a variety of attacks.

In access networks that support the mobility usage model, a threat related to session stealing occurs when an authorized terminal is handing over from an access point on which it is fully authenticated to another on which it is not yet authenticated.

If the handover protocol security is not properly designed, an attacker could take over session at the old access point for a period of time after the victim has moved, or the attacker could conversely hijack the session on the new access point while the victim is attempting to authenticate and set up the new session. This threat demandscareful attention to security around access point handover, and the corresponding operation at the IP level, handover between IP subnets.

The following are a list of common threats to wireless network access:The base threat that wireless network access systems must deter is unauthorizednetwork access. If the network requires users to have an account, unauthorized networkaccess occurs when a terminal cannot prove that it has an account. If the network allowsaccess to any terminal that can prove ability to pay, unauthorized network access occurswhen the terminal cannot provide proof of ability to pay, yet it nevertheless managesto obtain access to the network.If the network offers different kinds of service, another threat occurs if a terminalauthorized for a lower class of service is able to obtain access to a higher class ofservice without authorization.Once an authorized terminal has gained access to its allowable class of service, an attacker could attempt to steal the session and thereby obtain network access even though the attacker is not authorized, or the attacker could attempt to upgrade service with out authorization by hijacking the authorized session. In order to do this, the attacker would have to spoof the authorized terminal, so this is a kindof attack.

An eavesdropper could intercept the on the air and extract information from the that could harm theuser, or drop the denying service to the terminal.

While most of the threats above derive from an attacking terminal, there is also a threat from the network side. An attacker could set up a rogue access point or base station, and thereby spoof a legitimate terminal into connecting. The rogue access point couldthen examine and conduct a variety of attacks.

In access networks that support the mobility usage model, a threat related to session stealing occurs when an authorized terminal is handing over from an access point on which it is fully authenticated to another on which it is not yet authenticated.

If the handover protocol security is not properly designed, an attacker could take over session at the old access point for a period of time after the victim has moved, or the attacker could conversely hijack the session on the new access point while the victim is attempting to authenticate and set up the new session. This threat demandscareful attention to security around access point handover, and the corresponding operation at the IP level, handover between IP subnets.



access point vs router

Niciun comentariu:

Trimiteți un comentariu