Please enable JavaScript.
Coggle requires JavaScript to display documents.
Wireless Auditing & Risk Assessment (Technology (Risk Assessment Used…
Wireless Auditing & Risk Assessment
Technology
IT Security Management
Security practices and policies should be appropriate for size and value of network and its assets
cost-effective
Methodology
Quantitative assessment
Qualitative assessment
Risk Assessment on WLANs
Theft of data
Loss, theft, or hijacking of a mobile device
Viruses, worms, and Trojans
Legal Requirements
Laws and regulations require periodic risk assessments in different enterprise environments
Risk Assessment
Used to determine any change in requirements, technologies, or threats since the last risk assessment
Interception
Applies to data that travels over the network
Availability
Systems, servers, and applications must be available for the purpose they serve, Service level agreement (SLA)
Access
Refers to the points where remote users can join the network and where internal users can communicate with the outside world
Justifications for Other Risk Assessments
Justify cost of security
Can promote communications and productivity and break down interdepartmental barriers
Concept
WLAN Discovery Tools
InSSIDer
Wifi network scanning application
Kisme
t
Detects and interrogates 802?11a,
802.11b, 802.11g and 802.11n
NetStumbler
Locate and interrogate WLAN within
802.11a 802.11b and 802.11g
Heat Mapper
Locates and maps radio frequency
(RF) footprint for each access point
discovered on a grid
Penetration
Metasploit
To assess state of defense
Security Auditors Research
Assistant (SARA)
Vulnerability test
Integrates with NVD and Nmap
Context
Hijacking a session
Vulnerability exploited is inherent weakness in HTTP and way Web applications handle HTTP requests
Hijacking devices
Hackers create a rogue access point (evil twin) set with a high signal strength, then force a deauthentication
Denial of service
Sending constant stream of deauthentication (deauth) packets with spoofed MAC addresses to access points causes them to constantly deauthenticate and drop client connections
Network Utilities
Ping
Netstat
Radio frequency jamming
Jamming of the unlicensed radio spectrum’s 2.4 GHz and 5 GHz bands is a major vulnerability
Understanding
Security Risk Assessment Terms
Asset + Threat+ Vulnerabilities = Risk
Threat
A threat is anything that can damage or compromise an asset. A threat is what you are trying to protect against
Vulnerability
A vulnerability is a weakness that makes a threat possible or even probable.
Asset
An asset is anything of value, such as people, property, intellectual property, or information. An asset is what you are trying to protect
Risk
Risk is the combination of all three
Security Risk Assessment Stages
Information Gathering
General controls review (GCR) identifies threats existing in the general security processes
Risk Analysis
Security team uses risk-analysis techniques to determine value of assets and identify associated risks
Planning
Occurs before security risk assessment can take place. Stakeholders, roles, and responsibilities are determined
Asset Identification and Valuation
Risk assessor must identify all assets that fall within scope of risk assessment.
Vulnerability Assessment
identifying, evaluating, and documenting existence of vulnerabilities.
Objectives
Network Management
Control Tools
Airshack
Aircrack - ng
Network management systems
WLAN Hardware Audit Tools
Network Enumerators
Example : Nessus &
Nmap
WLAN Antennas
Password-capture and decryption tools
Auditing and recovering passwords
Dictionary-style attacks
Brute-force attacks