Escolar Documentos
Profissional Documentos
Cultura Documentos
By
Andrew M Almstrom
ABSTRACT……………………………………………………………………….. iv
LIST OF FIGURES………………………………………………………………..v
CHAPTER
I INTRODUCTION…………………………………………………………1
Statement of Problem……………………………………………. 2
Literature Review………………………………………………….3
III METHODOLOGY………………………………………………………5
Assumptions ………………..……………………………………. 5
WEP…………………………………………….…………..7
WPA……………………………………….………………. 8
WPA2…………………………………….…......………….8
MAC Filtering……………………….………………….…..9
Closed Network……………………………………………9
Range..……………………………………………………..9
ii
Rogue Access Points……………………………………..10
Audit Trail…………………………………………………..10
User Training………………………………………………11
HIPPA Compliance………………………………………………..11
REFERENCES…………………………………………………………………….15
iii
ABSTRACT
Since the first use of a computer for medical purposes, medical personnel
have been limited by the location of the computer. With the development of
wireless technology it was only a matter of time until it was used within a Military
Treatment Facility (MTF). Being mobile throughout the hospital, with constant
access to critical medical information would increase job quality, efficiency, and
performance. There are, however, some negative aspects; using this technology
air radio frequencies for interception by anyone with the right equipment and
this reason, strong data encryption must be coupled with multiple layers of
security. Controlling both the area of coverage as well as signal strength is also
needed in order to maintain data integrity. All users of the wireless network will
iv
LIST OF FIGURES
v
1
CHAPTER ONE
INTRODUCTION
Naturally, the use of this technology brings serious concerns that need to
be addressed. Due to the fact that this is such a broad subject, this paper will
focus mainly on the security aspect of implementing wireless security within an
MTF. The implementation of wireless security within a controlled Military facility
requires that certain guidelines and protocols be followed. Because of this, a
large majority of information for this research paper was taken from military
controlled internet sites, regulations, standards and other various outside
agencies.
2
Ever effort must be made in order to provide the best, most efficient,
health care possible to the military community. Wireless Technology is still in its
infancy stage and much technological advancement is being developed filed
almost daily. This technology, if understood and controlled, can benefit the
medical community in more ways than one.
3
CHAPTER TWO
LITERATURE REVIEW
The 802.11g standard for WLANs that offers transmission over relatively
short distances at up to 54 megabits per second (Mbps. Networks employing
802.11g operate at radio frequencies between 2.400 GHz and 2.4835 GHz. The
4
There are three forms of data encryption in WLAN software; WEP, WPA
and WPA2. Encrypted network traffic will most times deter the average intruder,
but by no means is encryption the final solution. Other forms of security are
needed, such as controlling who is connected to the network, areas of wireless
coverage, as well as users being educated about the security vulnerabilities of
wireless technology.
CHAPTER THREE
METHODOLOGY
The report was written focusing on the security aspect of using Wireless
Technology within a MTF. Three main sections are discussed: forms of data
encryption, physical security and HIPPA compliance. The main participant of this
paper was the subject matter expert, Gerald Murphy, who helped narrow the
focus of this paper as well as discuss some of the key security concerns of
Wireless Technology. The main instruments in this paper included both online
and print resources and are listed in the references section of this paper. The
procedures mainly focused on internet queries using multiple search engines and
other online resources.
Research Assumptions
• This paper assumes there is a wired network installed utilizing either fiber
or Cat 5 cable on a Client/Server based network.
• The concern of the radio frequency used to transmit data interfering with
medical equipment will not be discussed within this paper.
6
CHAPTER FOUR
There are three main IEEE 802.11X security protocols to discuss when
dealing with WLANs. The first one (WEP) is outdated and has many known
security vulnerabilities, but should nevertheless be discussed. The other two
(WPA and WPA2) are updated versions of WEP, are in whole more secure, but
are not without their flaws.
7
WEP
WEP is the lowest form of security and doesn't provide enough security for
most enterprise wireless LAN applications. WEP can be cracked in either the 40
bit or 128 bit variations within roughly fifteen minutes using any one of the many
off-the-shelf tools such as WEPCrack or Airsnort which are available free on the
internet. The problem with WEP is the use of weak keys. A hacker can easily
exploit this vulnerability, discover the default security key, and decrypt any
message being sent or received.
8
WPA
WPA2
MAC Filtering
Another form of security that can and should be used is Media Access
Control (MAC) Authentication. MAC addresses on wireless clients are burned
into the hardware. Once enabled, whenever the wireless access point or router
receives a request to join with the WLAN, it compares the MAC address of that
client against the access list. Clients on the list authenticate as normal; clients
not on the list are denied any access to the WLAN. Unfortunately, there is a
problem with this type of physical security. Some clients allow their MAC address
to be "impersonated" or "spoofed" in software. This would allow a hacker to
change his MAC address and gain access to the network.
With this form of security there is a large overhead due to the fact that all
Access Points will need to have access to the current access list. Although MAC
address filtering is not foolproof, it still remains a useful additional layer of
security which helps to improve the overall security posture of the WLAN.
Closed Network
A closed network is another form of security where the WLAN does not
broadcast its name Service Set Identifier (SSID) in beacon frames; workstations
must know the SSID in order to connect to access points in that network. The key
for this type of security to work is to change the default manufacturer SSID to
something that only your organization would understand.
This form of security is only as strong as the users of the network. Anyone
that gains access to the SSID will be granted access to the WLAN. For this
reason, this form of security should be used in conjunction with other forms of
security.
Range
Limiting the range of WLANs can actually benefit your network security.
By placing Access Points near the center of buildings and avoiding placing them
near exterior walls, the range will be limited to specific buildings and required
areas. Also, reduce the Access Point broadcast strength whenever possible to
help control the range of the signal within designated areas.
10
Naturally, limiting the range and strength will not completely protect the
WLAN from possible attackers but, it will deter many of them due to the fact they
will have to gain physical access to the building.
In most cases an employee has relatively free access to the facility, which
makes it possible for them to install a rogue access point. An employee may
purchase an access point and install it without coordinating with their IT
organization in order to access to the network from a conference room for an
important meeting. The majority of times when this occurs the individual did not
understand the security issues involved. As a result, the network is left wide open
for a casual snooper or hacker to attack.
Other times a hacker can install a rogue access point on the network but,
in order to do so, the hacker would need physical access to the network. This
would require the hacker to pass through other areas of physical security, and
most times would cause them look for other vulnerabilities.
Audit Trail
powerful tool that can be used to discover and trace a possible security breach.
For this feature to work, every user must have a unique username/password and
keep them confidential at all times.
Audit trails are useful when recreating a security breach. The negative
side of using an audit trail as security measure is the fact that this data is of the
past actions and is not very useful when trying to stop a one time hack attempt. It
is, however, useful if used to monitor continuous hack attempts in order to trace
them back to the hacker, or used to block previously unknown vulnerabilities.
User Training
HIPPA Compliance
Integrity Controls verifies that the data sent is actually the data that is
received. This is done through a mathematical algorithm in which a numerical
“fingerprint” is calculated based on unique characteristics of the original
message. Once the message is received the receiving computer recalculates the
hash using the dame algorithm. Then it compares the two numerical fingerprints
to prove that the message has not been altered.
CHAPTER FIVE
Recommendations
User training should not be overlooked. Having users that are fully trained
and understand the vulnerabilities of wireless technology only strengthens the
entire security program. The strongest aspect of any security program should be
training the computer users. Computer users should understand the basic
principles and fundamentals of wireless security. User training should include
initial as well as semi-annual refresher training. A strong training plan is vital to
the security of any wireless network.
Conclusion
Any time you transmit data over a network, you acknowledge a certain
level of insecurity. Transmitting that same data using radio frequencies increases
that risk exponentially. In today’s society, there is no such thing as a totally
secure network. Even the tightest security plan has vulnerabilities. The only way
to be 100% safe is to either turn off the computers, or take away all user rights.
Unfortunately, neither of these solutions is realistic for network administrators.
The best approach to securing a WLAN is with the use of multiple security layers
and user training.
network. There are many forms of physical security that can and should be used
from MAC filtering to scanning for rogue access points. When discussing the
security of wireless networks, there is no such thing as too much security.
Computer users are always the one possible weak link. No matter how
much security is in place to protect the network a user can make it all for naught.
Computer users need to be educated about the proper uses of wireless networks
as well as the vulnerabilities that come along with this type of technology. Only
the users that need wireless technology should be allowed to use it. The less
people accessing it the more controlled the environment is.
15
References
HIPPA Security: You Can Run, But You Can’t Hide. Retrieved Feb 28, 2005.
From:http://www.texmed.org/cme/pms/ec_pmsem/hippa/physical_safegua
rds.asp
DISA (10 February 2005). Mobile and Wireless Device Addendum to the
From http://iase.disa.mil/wireless/mobile-computing-addendum-v1r0.doc
From http://csrc.nist.gov/wireless/S05_NIST-tk2.pdf
Roshan and Leary (2004) 802.11 Wireless LAN Fundamentals: A practical guide
From http://iase.disa.mil/wireless/wirelessfaq.html
16
From http://iase.disa.mil/stigs/stig/wireless_stig-v3r1.zip
From http://standards.ieee.org/getieee802/802.11.html
ISS.net. Best Security Practices for HIPPA Compliance. Retrieved Feb 26, 2005.
From http://documents.iss.net/marketsolutions/ISSHIPAABrochure.pdf
From http://documents.iss.net/whitepapers/ActiveWirelessProtection.pdf
From http://iase.disa.mil/stigs/stig/network-stig-v5r2-9-29-03.doc
17
48.pdf
From www.dtic.mil/whs/directives/orres/pdf/d81002_041404/d81002p.pdf
From:http://www.apd.army.mil/pamdocs/PAM2530_detail.asp?ItemNo=07
9369
From https://ca.dtic.mil/cjcs_directives/cdata/limited/m651001.pdf