Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.

Slides:



Advertisements
Similar presentations
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
A Guide to major network components
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Securing a Wireless Network
SOHO Wireless Networking SCATA Nov 2005 Dr Duncan Hancox.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Addressing Networking for Home and Small Businesses – Chapter.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Internet Addressing. When your computer is on the Internet, anything you do requires data to be transmitted and received. For example, when you visit.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Wireless Networks Tamus, Zoltán Ádám
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1/28/2010 Network Plus Network Device Review. Physical Layer Devices Repeater –Repeats all signals or bits from one port to the other –Can be used extend.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Setting Wireless Network At Home By: Parveen Sharma.
Components of wireless LAN & Its connection to the Internet
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Networking Components Assignment 3 Corbin Watkins.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
ICT Unit 4: Network and the effects of using them
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Networking for Home and Small Businesses – Chapter 5
Instructor Materials Chapter 6 Building a Home Network
Networking for Home and Small Businesses – Chapter 5
Securing A Wireless Network
Wireless Network Security
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Networking for Home and Small Businesses – Chapter 5
Digital Pacman: Firewall Edition
Chapter 6 Networks Communicating and Sharing Resources
AbbottLink™ - IP Address Overview
Presentation transcript:

Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network

Wi-Fi at home  Using a broadband Internet connection and a single WAP wired and wireless clients can access each other and the internet  non-computer devices can access the wireless connectivity to other devices or the Internet

Disadvantages  Easier to connect remotely (unwanted)  Encryption protocol can be broken  Passwords can be forcibly hacked

Tools to Protect a Wireless Network  WPA/WEP –Wi-fi Protected Access Point –Wired Equivalent Protection  Mac Address Filtering  Assign Static IP Address  Good positioning of the Wireless Access Point/ WAP

WAP/WEP  Wired Equivalent Protection –64 Bit –128 Bit –256 Bit Increased Security Decreased Speed

Wired Equivalent Protection  24 bit send rate  Total Size is based on Send rate + encryption  64 bits = 24 bit send + 40 bit key  128 bits = 24 bit send bit key  256 bits = 24 bit send bit key –Approximately 58 hexadecimal digits

Wired Equivalent Protection  The larger the key the more intercepted packets it would take to break  Warning: –There are programs that can break these keys –There are programs that create enough traffic of packets to break even a 256 bit key

Mac Address Filtering  All Wireless Cards have Mac address  Filters can be set to allow or disallow all Mac address listed  This mean certain computers can be blocked  Or only certain computers can connect *Note hackers can make fake Mac address to get on

Assign Static IP Address  Most users use DHCP technology which allows the router to assign IP address automatically upon connection  This allow hacker easy access with valid IP address  By Assigning Static IP address access is limited to only those valid IP address

Good positioning of the Wireless Access Point/ WAP  Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets

Steps to secure a Wi-Fi Network 1)Change the default Administrator Passowrds 2)Turn on the Encryption Protocols 3)Change the Default SSID 1)This is the Name that will be seen by wireless devices. Default names tell intruders that the newtork is being poorly managed and easier to get into

Steps to secure a Wi-Fi Network 4)Enable MAC Address Filtering, this will force unwanted guest to use programs to create fake MAC address. 5)Disable SSID broadcast 1)This is used to create hotspot where client come and go often. In a home there is usually a consistent amount of people

Steps to secure a Wi-Fi Network 6) Assign Static IP address to devices 7) Enable Firewalls on Each computer and the Router 8) Good positioning of the WAP 9) Turn off the network during extended periods of not being used

Special Thanks Too  Google.com  About.com  Wikipedia.com