NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness Chapter 5 Wireless Network Security.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Settings.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Getting Started. Searching The best way to find information on the web: googling What search engines are there?
PLUG IT IN SIX Protecting Your Information Assets.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Setting Wireless Network At Home By: Parveen Sharma.
---Troubleshooting step by step. Introduction This presentation will guide you through checking the network problems while you try to access Internet.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Xbox Wireless Errors & Troubleshooting. Network: Failed Internet: Failed Xbox LIVE: Failed NAT: Connection Warning.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security By: Bryan M Keller.
Hotspot Shield Protect Your Online Identity
Instructor Materials Chapter 6 Building a Home Network
Networking and Health Information Exchange
Methods of Securing LANs
TECHNOLOGY GUIDE THREE
Securing A Wireless Network
Wireless Network Security
Security of a Local Area Network
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
FIXMYWIFI EXTENDER. STEP 1: OPEN THE DEVICE FROM THE PACKED BOX, THEN CONNECT THE ANTENNA TO THE DEVICE, AFTER COMPLETING THE PROCESS OF CONNECTING.
Technology, Issues, and Solutions by David Clark
Chapter 6 Networks Communicating and Sharing Resources
ENH500 WDS Bridge PtoP Link for IP Camera
TWO Set-ups Wired and Wireless.
SY604 NAT PPPoE Configuration
Configure a Wireless Router
Intuitive Red/Yellow/Green PC Health Status
Configure a Wireless Router
Router configurations setting
Wireless Spoofing Attacks on Mobile Devices
An Introduction to Wireless Router Setups
Presentation transcript:

NETWORK SECURITY

What do you see

THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.

WHAT HAPPEN IF YOUR NETWORK UNSECURED PR WITHOUT KEY? WEAKER SIGNAL USING THE ADDRESS OF YOUR ROUTER YOUR DATA AT RISK

WHAT IS? ENCRYPTION: SCRAMBLED DATA THAT ONLY COMPUTERS WITH THE RIGHT KEY CAN READ IT MAC ADDRESS: EVERY NETWORK CAN SPECIFY WITCH COMPUTER CAN CONNECT TO THE NETWORK FIREWALL: TO PREVENT [PEOPLE FROM ACCESSING THE COMPUTER ILLEGALLY

WAYS OF SECURING WIRELESS NETWORK CHANGING THE DEFAULT ADMIN PASSWORD SETTING UP ENCRYPTION SETTING UP MEDIA ACCESS CONTROL (MAC) ADDRESS FILTERING HIDING THE ROUTER BROADCASTING SERVICE SET IDENTIFIER (SSID) TURNING OFF THE ROUTER WHEN IS NOT IN USE REDUCING TRANSMITTING POWER

Q1: STATE TWO WAYS TO SECURE A WIRELESS NETWORK? Q2: EXPLAIN WHY IS IMPORTANT TO SECURE A WIRELESS NETWORK?