Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.

Similar presentations


Presentation on theme: "Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle."— Presentation transcript:

1 Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle

2 Sample Network Infrastructure Wireless Standards Accessing Wireless Router GUI Wireless Security Setup Service Set Identifier (SSID) Password (GUI Interface) MAC Filtering Encryption Contents

3 Network Infrastructure

4 What You Need At&t, Charter, Embark, Time Warner Hi-speed Internet Access Computer, Ipad, Game system, etc Wireless Device Motorola, Belkin, Dlink, Linksys Cable/DSL Modem Linksys, Dlink, Belkin, Netgear Wireless Router U.S. Curreny, Pesos, Yen, or Deblumes Money

5 Wireless Standards 5ghz, 54Mbps, 50ft Range a 2.4ghz, 11Mbps, ft. Range b 2.4ghz, 54Mbps, ft. Range g 2.4 or 5ghz, 144Mps, 150ft Range n

6 Accessing Web Based Utility Username: Password: admin Linksys Routers ( ) Username: admin Password: D-Link Routers ( ) Username: admin Password: password Netgear Routers ( ) Username: admin Password: Belkin Routers ( ) Be sure to always check your documentation Linksys Simulation

7 Wireless Security Setup (SSID) Name of your wireless network Establish a new SSID Routers default by broadcasting the SSID to devices Turn off broadcast

8 Wireless Security Setup (Default Password) Change the default web utility passwordChoose an alpha-numeric passwordFor example: Hellokitty80, or H3ll0k1tty80!

9 Each network card has a special 10-digit identifier, sometimes referred to as Physical Address. For example: E-8A-99 Wireless Security Setup (MAC Filtering)

10 WEP Wired Equivalent Privacy Introduced in 1997 Old insecure encryption TKIP Temporal Key Integrity Protocol Dynamically changes the key as the system is used Replaced WEP as a more secure encryption CCMP 128-bit encryption Data Confidentiality, ensures only authorized parties can access the information

11 Replace standard antenna with a hi-gain antenna Make sure Signal-to-Noise Ratio is 25dB or higher. Optimum is >40dB Centralize your wireless router Use equipment from the same company. (For ex. Linksys router with Linksys wireless cards) Add a wireless repeater Reduce interference from cordless phones and other 2.4ghz devices such as microwaves Update router firmware and wireless cards

12

13 nets.com/resources/tutorials/define_SNR_values.html


Download ppt "Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle."

Similar presentations


Ads by Google