Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wireless(review) a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Networking and Security
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
CWNA Guide to Wireless LANs, Second Edition Chapter Eight Wireless LAN Security and Vulnerabilities.
Wireless Networking.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Wireless Networks Tamus, Zoltán Ádám
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Wireless. Wireless hosts: end system devices; may or may not be mobile Wireless links: A host connects to a base station or host through a communication.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Computer Networks CSC September 23,
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
Securing A Wireless Network
Wireless Network Security
Wireless Local Area Network (WLAN)
How To Set Up A Wireless Network
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
802.11b Wireless Network Security
Presentation transcript:

Improving Security

Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A very powerful PC

IP address One IP address for one computer e.g

People Hacker Cracker

Tricks Social Engineering –Phishing – Trash

Making Router safer Traditional Wireless

Turn on Encryption WEP (Wired Equivalent Privacy) –Used in many routers –Weakness in the implementation (25GB of data to crack) –Still worthwhile to deploy WPA (Wireless Protected Access) –Safer than WEP

SSID Service Set Identifier Needed for communication default name for each manufacturer Measures –Change the default name –Stop broadcasting

Admin Account Default name and password Measures: –Change account name and password

DHCP Dynamic Host Configuration Protocol Assign IP address to each PC Measures: –Disable DHCP –Assign IP addresses manually –Enable IP filtering (if available)

MAC (Media Access Control) Unique MAC address for each LAN card Measures: –Accept computers with approved MAC addresses only

Other measures (for advanced users) Setting minimum connection speed Adjust power of radio signal

Wardriving Driving around to detect access points Facilities needed: –Notebook PC with wireless LAN card –A high gain antenna (optional) –Wardriving software

Encryption Cipher –Encrypt data Plaintext Ciphertext Encryption key

Public key cryptography Asymmetric key cryptography Consists of –One public key –One private key

Hybrid system One key system Public key system

Digital signatures A message has not been modified

Digital certificate Prove the identity of a sender Issued by certificate authority (CA)

Method to identify Challenge response