Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Presented by Serge Kpan LTEC Network Systems Administration 1.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Wireless LAN Security Shala VanGerpen December 8 th, 2005.
Wi-Fi Structures.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
Wireless Networking 102.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Common Devices Used In Computer Networks
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
Introduction to Networks Ruth Watson
Computer Concepts 2014 Chapter 5 Local Area Networks.
Assignment 3: Networking Components LTEC 4550 Jose L Ortiz Jr.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Computer Networks CSC September 23,
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
ICT Unit 4: Network and the effects of using them
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Secure Networks It’s not just for your office Dial-In Number: Meeting Number:
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
Wireless Network Security
How To Set Up A Wireless Network
HOW TO SETUP DLINK ROUTER?. STEP 1: You need to start from connecting the hardware.You need to unplug your modem from the power source. If you cannot.
Wireless Security.
Chapter 6 Networks Communicating and Sharing Resources
Computer Technology Networks & Internet.
Networking 101.
Presentation transcript:

Brianne Stewart

  A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less expensive than having to buy cables to connect your devices  Transmitted via radio waves Wireless Networks

  Wireless HAN (Home Area Network)  Wireless LAN (Local Area Network)  Wireless MAN (Metropolitan Area Network)  Wireless WAN (Wide Area Network)  The different types depend on the area the network is covering Types of Wireless Networks

  A router is a device that forwards data packets between networks  Routers help home computers connect to the internet Routers

  People usually rush to get their internet up and working, causing the security of their network to suffer  Many security problems can result if you do not properly set up protection for your network Setting up a Wireless Network

 1.Change default administrator password 2.Turn on WPA/WEP encryption 3.Change the default SSID 4.Enable MAC address filtering 5.Disable SSID broadcast 6.Disable auto-connecting to open Wi-Fi networks 7.Assign fixed IP address 8.Firewalls 9.Position router safely 10.Turn off network during long periods of non-use Steps to Protect Your Wireless Network

  The first step in protecting your network is to change the default administrator username and password  The login given is usually simple and easily picked up by internet hackers  Change it immediately Default Password

  Encryption is a form of technology that scrambles messages sent over wireless networks  You want to pick the strongest form you can find  All devices on your network must share the same encryption WPA/WEP Encryption

  Most manufactures give their products the same SSID  Example: SSID for Linksys is ‘linksys’  This makes it easier for someone to connect to your network  Change it immediately Default SSID

  Routers keep track of the MAC addresses of all the devices that connect to them  Setting up your router to only recognize the MAC addresses of your devices will help restrict your network MAC Address Filtering

  Wireless routers will broadcast your SSID over the air  This roaming feature will increase the chances of someone logging on to your network  This can be disabled easily Disable SSID Broadcast

  Do not auto-connect to open Wi-Fi networks  This will expose you to security risks  Computers may access this feature automatically without the user realizing so it is important to make sure this is turned off Auto-Connecting

  Most people on a home network will use a dynamic IP address, but it is too easy for hackers to get ahold of these  Instead use a static, or fixed, IP address  A private IP address range should be used IP Address

  Used to protect networks from unwanted access  Most routers now come with firewalls built in, but to be safe you need to check and make sure it is turned on Firewalls

  Avoid leakage  The farther this signal reaches, the easier it is for someone else to get on your network  Center your router in your home to minimize leakage Position of the Router

  During extended periods of non-use, your network should be turned off  This is the ultimate way of protecting your network, but it is impractical to do it every time you get off the internet Turing off the Network

  If you do not have a secure network it is easy for hackers to take control  Follow the simple steps to secure your network and it will be harder for anyone other than you to log in to your network Why it is important

  urity/tp/wifisecurity.htm Sources