Wireless Network (In)Security -...
-
Upload
truongthien -
Category
Documents
-
view
215 -
download
0
Transcript of Wireless Network (In)Security -...
![Page 2: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/2.jpg)
How to describe Wireless Technology?
![Page 3: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/3.jpg)
Last mile.
![Page 4: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/4.jpg)
Freedom.
![Page 5: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/5.jpg)
Cheap.
![Page 6: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/6.jpg)
Simple.
![Page 7: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/7.jpg)
Jakarta Wireless Survey 2003.
![Page 8: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/8.jpg)
Jakarta Wireless Survey 2005.
![Page 9: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/9.jpg)
WardrivingThe equipment
9
![Page 10: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/10.jpg)
![Page 11: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/11.jpg)
Wardriving:Captured information
11
![Page 12: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/12.jpg)
Wardriving:Captured information
12
![Page 13: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/13.jpg)
Wardriving:Captured information
13
ATM transactions in cleartext
![Page 14: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/14.jpg)
Warflying
14
![Page 15: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/15.jpg)
Warflying
15
![Page 16: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/16.jpg)
Rogue APs
16
Real AP
Rogue AP
Clueless User
![Page 17: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/17.jpg)
Gnivirdraw
• Inverse Wardriving.
• A Rogue AP looking for “Wi-Fi Suckers”.
17
Rogue AP
![Page 18: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/18.jpg)
Rogue AP how-to
• Use a compatible wireless card to create a competing access point
• Must provide network information (IP address, gateway, DNS) — DHCP
• Resolve all or specific addresses to your address, or NAT and provides fake DNS replies
• Dynamically display fake websites for popular URLs via virtual hosting
• Pray?!
18
![Page 19: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/19.jpg)
802.11 Phising
• What bits of information are users giving away via wireless?
• Domains
• Shares
• Proxies
• Installed software
• Other preferred wireless network
• More?
19
![Page 20: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/20.jpg)
FishNet
• Taking advantage of suspected client behaviour, such as zero configuration (rendezvous), auto-update services, etc.
• Fake services traps, exploiting clients, then install backdoors or propagate worms or whatever you want!
• Control the clients!
20
![Page 21: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/21.jpg)
Defence?
• Oh, there are many!
• Authentication and authorisation
• Cryptography
• etc.
21
![Page 22: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/22.jpg)
MAC address filtering
• Identification factor — MAC address
• Provided by manufacturers
• Intended to be permanent
• Today, changing MAC address is pretty easy
22
![Page 23: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/23.jpg)
Piggy-jacking on wireless connection
• Gaining access to a restricted communication channel by using already established other user session.
• Rule of thumb: Sniff the traffic, choose the target (other user) then impersonate the target as soon as the target logged off.
• Denial of service is FAIR in the game.
23
![Page 24: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/24.jpg)
Wired Equivalent Privacy (WEP) security issues
• IV (initialisation vector) reuse
• Known plain-text attack
• Partial known attack
• Authentication forging
• Denial of service
• Dictionary attack
• Realtime decryption
24
![Page 25: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/25.jpg)
Wi-Fi Protected Access (WPA) security issues
• Attack against Michael — cryptanalytic
• PSK (pre-shared key) dictionary attack vulnerability
• Attack on default key
• Denial of service attacks
25
![Page 26: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/26.jpg)
IEEE 802.11i (WPA2) insecurity
• One Message Attack on the 4-way handshake
• The attacker is capable of impersonating the authenticator, composing a “message”, and sending to the supplicant
• One simple one-message attack will cause PTK (Pair-wise Transient Key) inconsistency
26
![Page 27: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/27.jpg)
EAP(Extensible Authentication Protocol)
• IETF standard for extensible authentication in network access. It is standardised for use within PPP, IEEE 802.1X, and VPNs
• Proposed methods:
• Certificate authentication
• Token card/smartcard authentication
• Password authentication
• Pre-shared keys
27
![Page 28: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/28.jpg)
Security vulnerabilities in EAP methods
• Known security vulnerabilities of implemented or proposed EAP methods
• Kerberos vulnerability
• Cisco’s LEAP vulnerability — vulnerable to dictionary attacks
• EAP/SIM vulnerability — GSM/GPRS
• PAP vulnerability — cleartext authentication using RADIUS (even with protected tunnel)
• MITM attacks on Tunneled Authentication Protocols
28
![Page 29: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/29.jpg)
RADIUS (Remote Access Dial-in User Service)
• Widely deployed protocol for authentication, authorisation, and accounting (AAA) — simple, efficient, and easy to implement
• Issues on transport — UDP nightmare
• Issues on cryptography — Not widely used since many embedded systems do not have the horsepower or headroom for RADIUS over IPSec
29
![Page 30: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/30.jpg)
Security issues on Ad-hoc networks
• 802.11 enables Ad-hoc networking to communicate stations without an AP
• Recent IETF work in progress enables hosts to automatically assign IPv4 addresses without a DHCP server, and resolve names without a DNS server (IPv4 or IPv6)
• Stations can act as bridges (layer 2 approach) or routers (layer 3 approach, MANET)
30
![Page 31: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/31.jpg)
Wireless ImplementationHotspot
• Hotels
• Airports
• Coffee shops
• etc.
31
![Page 32: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/32.jpg)
How to use paid Hotspot
• Getting access
• Visit hotspot with wireless device
• Associate and get network configuration
• Open web browser and get redirected to login page
• Authenticate
• ... welcome to the Internet
32
![Page 33: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/33.jpg)
Getting access to paid Hotspot
• Buy pre-paid card
• Registration with credit card
• Pay later — charged in room hotel, need room number
• Send text message (SMS) via mobile phone
• Social engineering
• Hacking! :-)
33
![Page 34: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/34.jpg)
Wireless Hotspot critical points
• Network configuration
• Authentication and authorisation methods
• 3rd party interfaces
• Misunderstanding the trust
34
![Page 35: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/35.jpg)
Upcoming...
• Bluetooth
• RFID
• IrDA
35
![Page 36: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/36.jpg)
Bluetooth
• Wire replacement technology
• Low power
• Short range: 10m — 100m
• 2.4 GHz
• 1 Mbps data rate
36
![Page 37: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/37.jpg)
Bluetooth Hacking:Bluejacking
• Early adopters abuse ‘Name’ field to send message
• Now more commonly send ‘Business Card’ with message via OBEX
• ‘Toothing’ — casual sexual liasons
37
![Page 38: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/38.jpg)
Bluetooth Hacking:Bluesnarfing
• ‘Snarf’ — networking slang for ‘unauthorised copy’
• Target:
• Data theft
• Calendar: Appointments, Images
• Phone Book: Names, Addresses, Numbers, PINs and other codes, Images
38
![Page 39: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/39.jpg)
Bluetooth Hacking:Bluebugging
• Create unauthorised connection to serial profile
• High level of control to AT command set
• Call control — turning phone into a bug
• Sending/Reading/Deleting SMS
• Reading/Writing phonebook entries
• Setting Forwards
• Causing costs on vulnerable phones
39
![Page 40: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/40.jpg)
Bluetooth Hacking
40
Demo
![Page 41: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/41.jpg)
RFID
• The card information is obscured by a cycling code
• To defeat RFID is not by cracking the encryption, but by using repeater-transmitter to “extend” the range of RFID
• It is a whole lot easier to re-broadcast than crack and recreate the code
41
![Page 42: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/42.jpg)
IrDA
• Infra red unlikely to be replaced — fit for use, simple, and cheap
• The ultimate in ‘security by obscurity’: invisible rays, simple code with total control, inverted security model (end-users filters content)
• Vulnerable to simple replay attack. — record codes and retransmit• One-line command can open your garage door!
• foriin`perl-e‘for(0..255){printf(“%02x\n”,$_)}’`;doirsendSEND_ONCEgarage$i;done
42
![Page 43: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/43.jpg)
IrDAGarage door opener
43
Before
After
![Page 44: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/44.jpg)
IrDAHotel TV
• Inverted security model
• Back-end may broadcast all content
• TV filters content
• TV controlled by end-user
• No authentication required
• No encryption — closed system, eh?
44
![Page 45: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/45.jpg)
IrDAHotel TV
45
![Page 46: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/46.jpg)
Defending Wireless networks
• Multiple issues afoot. Need a solid grasp of network engineering, security, and user needs
• Architecture and Configuration
• Protecting the enterprise and the client
• Secure and Security Operations
46
![Page 47: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/47.jpg)
Wireless Architecture
• Many options... perhaps too many
• First, must understand how network and system architecture impacts wireless security
• Layered defences are a good way to start
• Securing layer-2 only
• Securing layer-3 only
• Securing both layers
47
![Page 48: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/48.jpg)
Other Defences
• Wireless usage policy
• Regular check for Rogue APs and latest vulnerability information
• Wireless honeypot
48
![Page 49: Wireless Network (In)Security - kambing.ui.ac.idkambing.ui.ac.id/.../ref-eng-3/network/network-security/WirelessNetworkInsecurity.pdf · IrDA • Infra red unlikely to be replaced](https://reader030.fdocuments.in/reader030/viewer/2022041200/5d3d9b4f88c993f8068caa03/html5/thumbnails/49.jpg)
Conclusion
• Fundamental problems in wireless security are no longer about technology; they are about how to use the technology
• Wireless is a complicated series of interconnections — security must permeate the system: its components and connections
• Like other modern systems have so many components designers, implementers, or users — that insecurities always remain
49
No system is perfect; no technology is The Answer™