HSC
Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > 802.11b Wireless Networks Security and Authentication
Go to: HSC Trainings
Search:  
Version française
   Services   
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o ARJEL
o Training courses
o E-learning
   Conferences   
o Agenda
o Past events
o Tutorials
   Resources   
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
   Company   
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
 communication
 
 
o HSC Newsletter
o Press review
o Press releases
o Publications
   Contacts   
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|802.11b Wireless Networks Security and Authentication  
> Access to the content HTML Beginning of the presentation
PDF PDF version [316KB]  
> Description This talk gives an overview of wireless technologies, reminds what are the issues with wireless 802.11 networks, and suggests several solutions to protect them, including organizationnal measures, assessments and user authentication.  
> Context & Dates Talk made at the SUR group from the OSSIR , on 9 July 2002.
 
> Author Hervé Schauer (Herve.Schauer@hsc.fr) 
> Type 83 slides [ French - HTML ]
Also available a PDF file poor quality [PDF - 316KB] and good quality [PDF - 4575KB]  
> Abstract &
Table of content

Flyleaf
Agenda
Hervé Schauer Consultants
Panorama global du monde sans fil
Technologies de réseaux sans fil
Principales technologies en réseau local
Problématique de la sécurité
Principes dans un réseau sans fil 802.11b
Succès des réseaux sans fils
Problèmes avec les réseaux sans fils
Propriétés du média
Liberté topologique
Caractéristiques de la technologie
Caractéristiques des implémentations
Fonctionalités des équipements
Positionnement dans l'architecture
Attaques contre les réseaux sans fil
Solutions
Gérer ses réseaux sans fil
Utiliser la sécurité des bornes
Mécanisme de sécurité de 802.11b: WEP
Auditer et surveiller les réseaux sans fil
   Protocole 802.11b : découverte de borne
   La verbosité du protocole
   Surveillance
   Recherche des réseaux 'sauvages'
   Audit de réseaux locaux sans fil
   Antenne directionnelle
   Cartes et antenne omnidirectionnelle
   Outils d'audit
Authentifier les utilisateurs de WLAN
   Portail HTTP
   IEEE 802.1X
      Introduction
      Principes
      Protocole
      Cadre
      Méthodes d'authentification
      LEAP
      EAP-TLS
      PEAP
   IEEE 802.11i
   TKIP
   Autres possibilités
Architecturer correctement ses WLAN
Conclusion
Sélection de ressources
Acronymes
Remerciements  

> Related documents
themeWireless
[Course]  Voice over IP security
[Course]  Wireless Networks Security
[Presentation]  Open source and intrusion tools for Wi-Fi networks [31 January 2006 - French]
[Article]  Wi-Fi security - WEP, WPA and WPA2 [28 December 2005 - French/English]
[Presentation]  WPA/WPA2 : A real security for WiFi ? [14 June 2005 - French]
[Presentation]  Mobility and security [20 January 2005 - French]
[Presentation]  Wi-Fi security, from WEP up to 802.11i [4 November 2004 - French]
[Presentation]  Wireless network : risk, solutions, questions for the expert [4 November 2004 - French]
[Presentation]  The Wi-Fi security, major stakes [8 April 2004 - French]
[Presentation]  Wi-Fi and security [23 March 2004 - French]
[Presentation]  Wi-Fi: Security and Risks [24 January 2004 - French]
[Presentation]  Wi-Fi Security : an important stake [6 November 2003 - French]
[Article]  Security of 802.11b wireless networks [27 June 2003 - French]
[Presentation]  Wireless LAN security [15 May 2003 - English]
[Presentation]  Wireless network security [26 March 2003 - French]
[Presentation]  WifiScanner presentation [11 February 2003 - French]
[Presentation]  Wi-Fi network and open source [6 February 2003 - French]
[Presentation]  Wi-Fi mechanism and technical risk [6 February 2003 - French]
[Presentation]  Wireless network: Detection and passive sniffing [14 November 2002 - French]
[Presentation]  802.11b network's security [6 November 2002 - French]
[Article]  Security of 802.11b wireless networks [8 July 2002 - French]
[Presentation]  Detecting and eavesdropping on WLANs: feasibility and countermeasures [27 June 2002 - English]
[Presentation]  Managing Wireless Networks in the Enterprise [27 June 2002 - English]
[Tool]  WifiScanner tool [802.11b stations and access points analyser/detector - English]
[Presentation]  802.11b Wireless Networks Security [10 April 2002 - French]
[Presentation]  802.11b Wireless Networks Security [14 March 2002 - French]
[Presentation]  Wireless Ethernet Networks Security [22 January 2002 - French]
[Techno-watch]  Intel Developers Forum Europe [26 May 2001 - French]
themeAuthentication
[Presentation]  Workstation Security [29 March 2007 - French]
[Presentation]  Identity Management [17 December 2004 - French]
[Tip]  PFS property in key interchange protocoles [17 October 2003 - ]
[Tip]  MD5 signatures in TCP [14 August 2003 - ]
[Tip]  HTTP/HTTPS authentication methods [10 March 2003 - French]
[Presentation]  Managing Wireless Networks in the Enterprise [27 June 2002 - English]
[Tip]  X509 certificats revocation [14 June 2002 - French]
[Article]  Authentication [20 September 2000 - French]
[Presentation]  Tokens : end of the password ? [8 February 1994 - French]
> Copyright © 2002, Hervé Schauer Consultants, all rights reserved.

 

Last modified on 14 October 2002 at 16:20:50 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants