Page 228 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 228

Wireless Networks




                    Notes          Objectives

                                   After studying this unit, you will be able to:

                                   z z  Discuss the concept of User Authentication
                                   z z  Describe the 802.11 Authentication Vulnerabilities
                                   z z  Explain the Medium Access Control (MAC) Filters

                                   z z  Define concept of Public-key Cryptography
                                   z z  Discuss the 802.1X
                                   z z  Explain the Security Policies
                                   Introduction


                                   Identification and authentication are used to establish a user's identity. it appears that a user-
                                   authentication system for consumer communities on the Web is growing beyond the traditional
                                   database-driven and/or directory-driven component of a Web application, for organizations
                                   that  have  higher  data-confidentiality  requirements.  Implementation  approaches  for  strong
                                   authentication span a full spectrum  that ranges from  highly integrated and  interconnected/
                                   dependent to simple extensions of existing stand-alone architectures. The escalating trend of
                                   moving data and services into the cloud also necessitates methodical planning to ensure secure
                                   access to authorized users over the Internet. While existing simple-password–based authentication
                                   might continue to work for many consumer-oriented Web sites, its inherent vulnerabilities have
                                   been identified as security risks for institutions that have higher data-privacy requirements. To
                                   mitigate the risk of online identity fraud, organizations look to strong user authentication as the
                                   solution for improving their Web-based authentication systems.

                                   14.1 Concept of User Authentication

                                   User authentication is a means of identifying the user and verifying that the user is allowed to
                                   access some restricted service. Identity theft remains one of the more prevalent issues on the
                                   Internet today. Still digital identity fraud is still on the rise, with an increase in sophistication
                                   (that is, "phishing," "man-in-the-middle," DNS poisoning, malware, social engineering, and so
                                   forth)  and  an  expansion  of  attack  vectors  (that  is,  unregulated  financial  systems,  lottery  and
                                   sweepstakes contests, healthcare data, synthetic identities, and so on). With the upward trend
                                   of moving data and services into the Web and cloud-based platforms, the management and
                                   control of access to confidential and sensitive data is becoming more than verifying simple user
                                   credentials at the onset of user sessions for one application, and with higher interconnectivity
                                   and interdependencies among multiple applications, services, and organizations.
                                   One of the more exploited methods today is the gaining of account access by stealing reusable
                                   credentials for Web sites that have not yet implemented "strong" user authentication. This is
                                   so, because most common  forms of credentials today are knowledge-based (that is, user ID
                                   and  password)  and  are  requested  only  once  during  sign-on,  which  provides  a  higher  level
                                   of  convenience  to  users,  but  also  requires  less  effort  for  attackers  to  exploit.  Many  attacks
                                   are  manifested  as  "phishing"  messages  that  masquerade  as  ones  that  are  sent  by  legitimate
                                   organizations and contain URLs that point to fraudulent Web sites that have the same appearances
                                   as genuine ones. Often, they act as "man-in-the-middle" and eventually do forward visitors to the
                                   actual Web sites; but, in the process, they have captured valid credentials that can be used to gain
                                   access to actual accounts.

                                   The ease with which online identities can be stolen and used effectively has prompted many
                                   organizations and governing bodies to raise alarms. In the U.S., the October 2005 Federal Financial
                                   Institutions Examination Council (FFIEC) "Authentication in an Internet Banking Environment"


          222                              LOVELY PROFESSIONAL UNIVERSITY
   223   224   225   226   227   228   229   230   231   232   233