Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy
Total Page:16
File Type:pdf, Size:1020Kb
Y L F M A E T Team-Fly® Wireless Security Essentials Defending Mobile Systems from Data Piracy Russell Dean Vines Wiley Publishing, Inc. Publisher: Robert Ipsen Editor: Margaret Eldridge Assistant Editor: Adaobi Obi Managing Editor: Micheline Frederick New Media Editor: Brian Snapp Text Design & Composition: Wiley Composition Services Designations used by companies to distinguish their products are often claimed as trade- marks. In all instances where Wiley Publishing, Inc., is aware of a claim, the product names appear in initial capital or ALL CAPITAL LETTERS. Readers, however, should contact the appro- priate companies for more complete information regarding trademarks and registration. This book is printed on acid-free paper. ∞ Copyright © 2002 by Russell Dean Vines. All rights reserved. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copy- right Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspointe Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4447, E-mail: [email protected]. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Library of Congress Cataloging-in-Publication Data: ISBN: 0-471-20936-8 Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 This book is dedicated to the heroes of 9/11/01, common people who performed uncommon deeds when the time required it. And especially to my friend Lingard Knutson, who helped lead her Port Authority co-workers down 62 flights of stairs from Tower 1 to safety. We should all have such angels. Contents Preface xiii Introduction xvii Origin and Rationale xviii Organization xix What’s on the website xxi Part I Technology Essentials 1 Chapter 1 Computing Technology 3 Computer Basics 4 CPU 4 Bus 4 Memory 5 Operating Systems and Software 7 Software 7 Network Technologies 8 Analog versus Digital 8 Local Area Networking 9 LAN Topology 10 LAN Cabling 13 LAN Network Devices 14 Wide Area Networking 19 Circuit-Switched versus Packet-Switched Networks 19 Packet-Switched Technologies 21 Private Circuit Technologies 22 Virtual Private Networking (VPNs) 22 VPN Communications Standards 23 v vi Contents Firewalls 23 Packet-Filtering Firewall 24 Application-Level Firewalls 24 Stateful Inspection Firewall 24 Protocols 25 Open Systems Interconnect (OSI) Model 25 Transmission Control Protocol/ Internet Protocol (TCP/IP) Model 27 TCP/IP Protocols 28 The Wireless Application Protocol 29 Chapter 2 Wireless Theory 33 A Painless History of Wireless Technology 33 The Cellular Phone Network 34 Worldwide Cellular via LEO Satellites 35 Cellular Network Elements 35 The Call Process 36 Wireless Cellular Technologies 36 Wireless Transmission Systems 37 Advanced Mobile Phone System 37 Time Division Multiple Access 38 Code Division Multiple Access 38 Global System for Mobile Communications 39 Cellular Digital Packet Data 39 Nordic Mobile Telephone 39 Total Access Communication System 39 Personal Digital Cellular 40 Short Message Service 40 The Generation Gap 40 2.5G Technologies 41 3G Technologies 42 Wireless Data Networking Technologies 44 Spread Spectrum Technology 44 Direct Sequence Spread Spectrum (DSSS) 44 Frequency-Hopping Spread Spectrum (FHSS) 45 Orthogonal Frequency Division Multiplexing 46 IEEE 802.11 Specifications for Wireless LANS 47 Original IEEE 802.11 LAN Standard 48 IEEE 802.11b 48 IEEE 802.11a 49 IEEE 802.11g 50 IEEE 802.11e 51 802.11 Wireless Network Operational Modes 51 Ad Hoc Mode 51 Infrastructure Mode 52 Bluetooth 54 Bluetooth Advantages and Disadvantages 55 Contents vii HomeRF 55 HomeRF Technology Overview 56 HomeRF and Shared Wireless Application Protocol 58 High-Performance Radio LANs 59 HiperLAN/1 59 HiperLAN/2 59 Wireless Application Protocol 61 WAP Layers 62 Application Layer 63 Session Layer 63 Transaction Layer 64 Security Layer 64 Transport Layer 64 Chapter 3 Wireless Reality 65 Wireless Standards and Technologies 65 802.11 66 Benefits of WLAN 66 802.11b Encryption 66 Other Notable IEEE 802 Wireless Standards and Drafts 67 802.1x Port-Based Network Access Control 67 802.15 Wireless Personal Area Networks 68 802.16 Broadband Wireless Access 69 802.11g 69 Nonwireless IEEE Standards 69 802.1v VLAN Classification by Protocol and Port 69 802.17 Resilient Packet Ring Access Protocol 70 Other Standards Working Groups 70 HomeRF 71 Comparing 802.11b to HomeRF 73 HomeRF Security 73 Bluetooth 73 System Architecture Features 74 The Piconet 75 Bluetooth Hardware Elements 76 Battery Conservation 78 Bluetooth Versions 79 Common Bluetooth Applications 80 Bluetooth Security 81 Wireless Personal Area Network 82 Infrared Data Association (IrDA) 82 Comparing Bluetooth to IrDA 84 Directionality 84 Other Comparisons 84 Wireless Hardware and Devices 85 Personal Electronic Devices 85 viii Contents PDAs 85 The Palm OS 86 Windows Handhelds 87 Other PDA Devices 88 Internet-Enabled Cell Phones 88 WAP-Enabled Phones 89 Symbian OS 89 Nokia 90 Ericsson R380e 92 Motorola i90c iDEN 93 BlackBerry 96 BlackBerry Internet Edition 96 BlackBerry Enterprise Edition 96 BlackBerry ISPs 97 Wireless Applications 98 Wireless Technologies in the Home 98 Wireless Technologies in the Office 99 Wireless Technologies in Public Spaces 99 Part II Security Essentials 101 Chapter 4 Security Concepts and Methodologies 103 The Concepts of C.I.A. 105 Confidentiality 105 Integrity 106 Availability 107 Threats, Vulnerabilities, and Risk 107 Certification and Accreditation 107 Policies and Procedures 108 Business Continuity and Disaster Recovery 109 Alternative Processing Sites 110 Wireless Disaster Recovery 111 Information Classification Concepts 111 The Ten Domains of the International Information Systems Security Certification Consortium 112 TCSEC and the Common Criteria 113 The Orange Book 113 The Red Book 114 The Common Criteria 114 DITSCAP and NIACAP 115 DITSCAP 116 NIACAP 116 INFOSEC Assessment Methodology (IAM) 117 The IAM Process 118 BS7799 119 Contents ix A Short History of Cryptography 120 The Early Days of Secret Writing 120 Early Disk Use 121 The 1920s 122 Rotor Systems 122 Identification and Authorization 123 Identification and Authentication 123 Passwords 124 Access Control Models 125 Mandatory Access Control 125 Discretionary Access Control 125 Nondiscretionary Access Control 126 Controls 126 Accountability 127 Chapter 5 Security Technologies 129 Cryptographic Technologies and Public Key Infrastructure 129 Secret Key Cryptography (Symmetric Key) 130 Data Encryption Standard 130 Advanced Encryption Standard 131 Public (Asymmetric) Key Cryptosystems 131 One-Way Function 132 Public Key Algorithms 132 Public Key Infrastructure 133 Department of Defense Wireless PKI Initiative 134 Wired Equivalent Privacy 135 WEP Encryption 136 WEP Decryption 137 WEP RC4 137 WEP Authentication Methods 138 Open System Authentication 138 Shared Key Authentication 138 WEP Key Management 140 Wireless Application Protocol Security 141 Wireless Transport Layer Security 142 End-to-End Security via the WAP Gateway 144 Bluetooth Security Architecture 146 The Security Manager 146 Link-Level Security Features 147 Mode 2: Service-Level Security 147 Mode 3: Link-Level Security 148 Other Bluetooth Security Architecture Features 149 Wireless Tools 150 Wireless VPNs 150 movianVPN 151 x Contents Wireless Packet Sniffers 152 AiroPeek 152 Cisco Systems’ Wireless Products 154 Aironet 350 Features 154 Aironet 350 Management Options 155 Security Monitoring and Testing 156 Intrusion Detection Systems 157 Network-Based IDS 158 Host-Based IDS 158 IDS Detection Methods 159 Signature-Based ID 159 Statistical Anomaly-Based ID 160 Penetration Testing 160 Chapter 6 Threats and Solutions 163 Security Threats to Personal Electronic Devices 163 Vulnerability of PDA Operating Systems 164 PDA Vulnerability Caused by Physical Loss 165 Identification and Authentication 166 Catching PDA Viruses 166 Phage.963 167 Vapor.741 167 LibertyCrack 167 Tapping Infrared Vulnerabilities