Securing A Wireless Network

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Home Wireless Security David Mitchell 12/11/2007.
Security in Wireless Networks Juan Camilo Quintero D
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security. Objective: Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your.
Chapter 9 Connecting to and Setting up a Network
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
How to Secure a Home Wi-Fi S. Roy. Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Securing a Wireless Network
WIRELESS NETWORKING. What are the advantages to wireless networking? How has society changed?
Confidential and Proprietary Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze Leo Walsh, GSNA Professional Jefferson Wells.
Wireless Networking and Security
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Setting Wireless Network At Home By: Parveen Sharma.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
How to hack into mobile phones via bluetooth & How to Hack Wireless Internet Connections in 3 Easy Steps PresentedBy Pradosh H.S.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Secure Networks It’s not just for your office Dial-In Number: Meeting Number:
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
Wireless Network Security
Wireless Network Security
Wireless Local Area Network (WLAN)
Wireless Hacking.
Wireless Networking Chapter 23.
Chapter 12 Communications Security & Countermeasures
Technology, Issues, and Solutions by David Clark
Wireless Security.
Wireless LAN Security 4.3 Wireless LAN Security.
Chapter 6 Networks Communicating and Sharing Resources
Security Issues with Wireless Protocols
Presentation transcript:

Securing A Wireless Network Jason Francis

Secure Wireless Device Routers & Access Points - Secure Login - Change default password - Password strength should be uncommon & strong - Factory Reset

Enable WPA/WPA2 Encryption WPA (Wi-Fi Protected Access) Provides stronger protection than WEP Passwords are limited to A-F & 0-9 Wireless Hardware & OS friendly WPA2 provides strongest wireless encryption but users might have to download a patch

Using WEP WEP (Wired Equivalency Privacy) Known weaknesses Better than no encryption at all Used for non-pc devices (i.e. PDA, MP3, DVR) Passwords should be changed often Same Cryptographics

MAC Address Filtering Unique 12-character address specific to network adapter Limits network access to only those machines and devices that you know about Can be inconvenient to setup if there are many devices and machines MAC addresses can be spoofed by skilled hackers

Reduce WLAN Transmission Available on most routers and wireless devices Allows user to reduce signal of wireless range Minimizes outsider attacks Trial-and-Error

Disable SSID Broadcast SSID (Service Set Identifier) Routers & Access Points broadcast SSID continuously Convenient when enabled for wireless setups Undetectable to neighbors and war-drivers Wireless Network can still be found using “sniffers”

Remote Admin Remote Admin gives users the power to administer the network via the internet Must use specific IP address or limited IP address range Anyone anywhere could potentially gain access to your system Best left disabled, unless you really need this function

Summary Change default password Enable WPA2 Encryption (if available) If no WPA2 or WPA, WEP is better than no encryption at all MAC address filtering Reduce WLAN transmission Disable SSID Broadcast Disable Remote Admin Enable Key Rotation

Extras

Tools Cain & Abel Aircrack - 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. - Used for auditing