Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?

Slides:



Advertisements
Similar presentations
Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
Advertisements

Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security Awareness Chapter 5 Wireless Network Security.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
SIR Area 2 Computers & Technology Dean Steichen March 2012.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Networking and Security
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Getting Started. Searching The best way to find information on the web: googling What search engines are there?
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
CS101 Lecture 9 Network Basics. Computers love bytes and a factor of ____ Up to now we have been using bytes as our main unit of measurement with a factor.
Home Networks Taught by Gary Gabris. Home Networks What is a home network What good is having one - neat things you can do with one General network info.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Computer Networks CSC September 23,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
CS101 Home Network Basics.
Gary m. smith, usaf (Retired)
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
TECHNOLOGY GUIDE THREE
Securing A Wireless Network
Wireless Network Security
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Chapter 12 Communications Security & Countermeasures
CS101 Home Network Basics.
Wireless LAN Security 4.3 Wireless LAN Security.
Chapter 6 Networks Communicating and Sharing Resources
CS101 Home Network Basics.
CS101 Home Network Basics.
IP Addresses & Ports IP Addresses – identify a device on a network
An Introduction to Wireless Router Setups
Presentation transcript:

Chapter 7 Securing your Wireless Network (WIFI)

Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers? How do they get in? First line of defense: secure the WI-FI network. Detecting a visit from a wireless snoop. What to do if you detect a snoop Wireless snoop defenses.

What is a wireless home network? A network is a way to connect computers and other devices together so they can share files, access to the internet and printers and other stuff. Wireless and home require little explanation. Wired IS faster, but wireless is more convenient. It also has its headaches; that is what this chapter is about.

WI-FI technologies: b The oldest: 11 Mbps, (really 2-4 Mbps) 2.4 GHz frequency: (cordless phones, baby monitors garage door openers, microwaves) a 54 Mbps (20-30 Mbps), 5GHz g 54 Mbps, 2.4 GHz, 35 Meters ~ 115 feet range n 135 Mbps 2.4 and 5 Ghz 70 Meters range

What damage can a wireless network snoop do? They are not malicious, most of the time. However, they can (and some will): – Use your internet connection to download illegal material. – Use your internet connection to hack and maybe steal data. – Use your network to send SPAM – Install malware in your computer(s) – Steal information from your computer(s) – Gain access to your office computer through your home computer. – They might sabotage your network

Who are the snoopers? Wardrivers: there are actually war-driving maps Bandwidth Bandits Wireless Hackers

Some tricky WI-FI spots WI-Phishing: WI-FI spots, (free) set up by bad guys who watch the traffic and harvest all the information they can use later for their purposes. Dead-End WI-FI access points: free access points which don't seem to work; your computer gets turned into an access point. Instructions for changing this are on page 195. For Windows 7, use the procedure for Vista.

How do they get in? Most routers are unsecured – No encryption – Router administrator is unprotected. Some routers do come with protections: AT&T for example. They are the exception.

First line of defense: secure the WI-FI network. Access your router (through a wire!!) Login (most login information is in the manual or on page 200) Change the password!! Change the SSID (Service Set ID) Enable WI-FI security: (see page 205) – Choose WEP, WPA or WPA2 You may want to turn on MAC address filtering. (pp )

How to find your wireless SNOOP There is a page giving the computers logged into the router..

What to do if you detect a snoop Turn off wireless access Activate/change the security settings Assess the damage

Wireless snoop defenses. Change the Router Password Change the default SSID Turn on the Windows Firewall Turn UpnP on the Router Turn off your router (or at least the wireless) when not in use. In Windows be careful with file sharing, network discovery, media sharing.