Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Unleashing Your Laptop Justin Sellers. Wireless Access Today we will talk about several different wireless scenarios. We will also cover the hardware,
How To Set Up A Wireless Network Using A D-Link Wireless Router
Security in Wireless Networks Juan Camilo Quintero D
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Wireless LAN Security Shala VanGerpen December 8 th, 2005.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
D-Link International Call Center Training and Staff Development Department Module: DAP-1350 Module: DAP-1350.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Configuring your Home Wireless Network Configuring your Home Wireless Network Adapted from Presentation at APCUG By Jay Ferron ADMT, CISM, CISSP, MCDBA,
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
SIR Area 2 Computers & Technology Dean Steichen March 2012.
Configuring Linksys Wireless Ethernet Bridge Prof. Valencia Community College.
Technical Training: DIR-615
Wireless(review) a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
Wireless Networking 102.
195Eg Ethernet Wired LAN 195Eg. Wireless Ethernet Setting IP Address Using Utility Programs Begin Programming Definition Selection Programming Modes of.
DWR-113 FAQ’s 3G WiFi Router.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Linksys LNKWET11 Setup b Ethernet Converter Step 1. Annotate your Computer’s ethernet IP address. Step 2. Change the Ethernet IP Address/subnet/router.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
A History of WEP The Ups and Downs of Wireless Security.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Computer Concepts 2014 Chapter 5 Local Area Networks.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Setting Wireless Network At Home By: Parveen Sharma.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Methods of Securing LANs
How To Set Up A Wireless Network
Presentation transcript:

Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle

Sample Network Infrastructure Wireless Standards Accessing Wireless Router GUI Wireless Security Setup Service Set Identifier (SSID) Password (GUI Interface) MAC Filtering Encryption Contents

Network Infrastructure

What You Need At&t, Charter, Embark, Time Warner Hi-speed Internet Access Computer, Ipad, Game system, etc Wireless Device Motorola, Belkin, Dlink, Linksys Cable/DSL Modem Linksys, Dlink, Belkin, Netgear Wireless Router U.S. Curreny, Pesos, Yen, or Deblumes Money

Wireless Standards 5ghz, 54Mbps, 50ft Range a 2.4ghz, 11Mbps, ft. Range b 2.4ghz, 54Mbps, ft. Range g 2.4 or 5ghz, 144Mps, 150ft Range n

Accessing Web Based Utility Username: Password: admin Linksys Routers ( ) Username: admin Password: D-Link Routers ( ) Username: admin Password: password Netgear Routers ( ) Username: admin Password: Belkin Routers ( ) Be sure to always check your documentation Linksys Simulation

Wireless Security Setup (SSID) Name of your wireless network Establish a new SSID Routers default by broadcasting the SSID to devices Turn off broadcast

Wireless Security Setup (Default Password) Change the default web utility passwordChoose an alpha-numeric passwordFor example: Hellokitty80, or H3ll0k1tty80!

Each network card has a special 10-digit identifier, sometimes referred to as Physical Address. For example: E-8A-99 Wireless Security Setup (MAC Filtering)

WEP Wired Equivalent Privacy Introduced in 1997 Old insecure encryption TKIP Temporal Key Integrity Protocol Dynamically changes the key as the system is used Replaced WEP as a more secure encryption CCMP 128-bit encryption Data Confidentiality, ensures only authorized parties can access the information

Replace standard antenna with a hi-gain antenna Make sure Signal-to-Noise Ratio is 25dB or higher. Optimum is >40dB Centralize your wireless router Use equipment from the same company. (For ex. Linksys router with Linksys wireless cards) Add a wireless repeater Reduce interference from cordless phones and other 2.4ghz devices such as microwaves Update router firmware and wireless cards

nets.com/resources/tutorials/define_SNR_values.html