Wireless network security (course study notes)

Wireless network security overview

  • The difference between wireless network and wired network

    • 1. Openness of network connection
      • The network connection of the wired network is relatively fixed, with definite boundaries;
      • Wireless networks do not have a clear defense boundary. The openness of the wireless network brings about information interception, unauthorized use of services, malicious injection of information, etc. A series of information security issues.
        • DDoS attack
    • 2. Mobility of network terminals
      • The user terminal of the wired network and the access device are connected by a cable, the terminal cannot be moved in a large range, and the management of the user is relatively easy.
      • The wireless network terminal can not only move in a large range, but also roam across regions.
    • 3. The topology of the network
      • The wired network has a fixed topology, and security technologies and solutions are easy to deploy.
      • In a wireless network environment:
        • ① The dynamic and changing topology structure lacks centralized management mechanism, which makes the security technology more complicated;
        • ②Many decisions are decentralized, and many network algorithms must rely on the joint participation and cooperation of a large number of nodes to complete
    • 4. The stability of network transmission signal
      • The transmission environment of the wired network is determined, and the signal quality is stable.
      • Wireless network: The channel characteristics change with the user's movement. It puts forward higher requirements for the robustness (robustness, high reliability, high availability) of wireless communication network security mechanisms.
    • Features of network terminal equipment
      • Wired networks are generally not physically accessible to attackers.
      • The wireless network may be physically touched by the attacker, so there may be a fake access point (AP)
      • Compared with terminals of wired networks (such as PCs), wireless network terminal devices have the characteristics of limited resources such as computing, communication, and storage, as well as requirements for power consumption, price, and volume.
  • Wireless network security threats

    • Information leakage
    • Integrity breach
    • Unauthorized use of resources
    • Denial of service provision
  • Android and IOS security

    • Android
      • 1. Meet the Android platform
      • 2. Features of Android
        • The Android system is an open-source operating system based on Linux. Both mobile phone manufacturers and individual developers can customize it based on the Android standard operating system.
        • Android platform system architecture level
          • Application layer
          • Architecture layer
          • Run layer
          • Linux kernel layer
      • 3. Android platform security issues
        • Due to its open nature, the Android platform has greater security risks than other mobile terminal platforms (allowing users to directly access the file system).
        • The Android system itself has many security check and defense mechanisms to protect the security of the system itself and various applications on it.
        • In most cases, important data is still exposed to risks, and the main security risk threats come from ROOT and malware
        • The harm of ROOT
          • In the Linux system, ROOT is the user with the highest authority.
          • When the authority to open the system to users is reduced, certain functions and operations will have restrictions, and ROOT removes this restriction in a special way, so that users can obtain ROOT authority when using mobile phones.
        • The impact of ROOT:
          • It is not possible to upgrade the system through the official, but you can download a large number of third-party system firmware, so that the phone has better body expansion.
          • Viruses and Trojans on the device have more opportunities to damage the device or use the system to achieve its illegal purpose.
          • Can delete some important files
        • The threat of malware
    • IOS platform and its security
      • IOS security mechanism
        • Separation of authority
        • Mandatory code signing
        • Random layout of address space
        • Sandbox
  • Mobile terminal security

    • concept
      • A mobile terminal (or mobile communication terminal) refers to a computer device that can be used while moving.
    • safe question
      • On the one hand, any kind of system or platform has its own vulnerability;
      • On the other hand, there are a large number of applications on mobile terminals, many of which have not undergone rigorous security testing for various reasons before going online, resulting in serious security risks.
      • Local storage of sensitive information
        • account number
        • password
        • Cookie
        • Bank card payment
      • Network data transmission
      • malicious software
      • Application security
      • System security issues
  • Wearable device security

    • concept
      • A device that is worn directly on the user or integrated into the user's clothes or accessories.
    • advantage
      • easy to carry
      • Good interactivity
      • Does not distract users from life and work
      • Perceive the environment and control equipment anytime, anywhere
    • Two-sided
      • On the one hand, wearable devices have become more closely connected with people in work and life, with more user information, privacy issues and data security have become the top priorities of wearable device security;
      • On the other hand, wearable devices can seamlessly exist in the living and working environment, allowing users to engage in illegal activities such as spying that could not be carried out before, becoming an alternative social security issue.
    • According to the function of the main equipment
      • Wearable terminal
        • Wearable terminals are first and foremost independent computing systems that can independently process data and information to complete specified tasks.
      • Wearable peripherals
        • Wearable peripherals refer to hardware devices connected outside the computer host, which play the role of transmission, transfer and storage of data and information, often without processing capabilities;
      • Similarity
        • Wear directly on the user or integrate into the user's clothes or accessories.
    • Typical wearable device
      • 1. Smart glasses:
        • Independent operating system
        • Install programs provided by software service providers such as software and games
        • Use voice or motion control to complete functions such as adding schedule, map navigation, interacting with friends, taking photos and videos, and starting video calls with friends
        • Wireless network access through mobile communication network
      • 2. Smart Watch
      • 3. Smart shoes
    • The root cause of safety hazards
      • Open system
    • Purpose of design and application
      • Beautiful design
      • Flexible to use
      • Various uses
    • Main security risks
      • Internal vulnerability
      • External attack
    • Wearable device
      • To meet confidentiality, integrity, and availability goals
      • Can not violate the social security without restrictions and then obtain the data of others to carry out illegal activities
      • Principles to be followed
        • Holistic principle
        • Principle of relativity
        • Principle of purpose
        • Principle of scalability
      • Wearable devices need to implement information security protection systematically, and improve their security by improving their own safety and external security protection.
  • Drone safety

    • Drone
      • UAV system
        • Aircraft platform system
          • Body
          • power system
          • sensor
          • Navigation System
          • Communication Systems
          • Aircraft control system
        • Mission load system
          • PTZ
          • camera
          • sensor
          • Radio control
        • Ground control system
          • Radio control
          • GPS navigation
          • Data processing system
          • surveillance system
          • Auxiliary equipment
      • Application scenario
        • Aerial photography
        • monitor
        • Agricultural plant protection
        • Air wireless network
        • data collection
      • Security and privacy issues
        • Wireless signal hijacking and interference
        • GPS spoofing
        • Attacks against sensor networks
      • Security threats
        • Safety issues based on the characteristics of the UAV itself.
          • Drone control
          • Drone cruise
        • Safety problems in the combination of drones and applications
          • HD camera
          • Thermal imaging camera
        • Policies and regulations govern the safety problems in blind spots
          • Detection, attack, and capture of illegal drones
          • Drone accident blame, leakage of private data, and the need to obtain electronic evidence for identification

mind Mapping

Wireless network security mind map

Published 8 original articles · Likes2 · Visits 319

Guess you like

Origin blog.csdn.net/WHD1998/article/details/105515309