Bullet-Proofing Your Wireless Router By Steve Janss.

Slides:



Advertisements
Similar presentations
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Advertisements

®® Microsoft Windows 7 Windows Tutorial 8 Connecting to Networks with Mobile Computing.
PC Security 101 Keeping your data and your computer safe.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Wi-Fi Structures.
Chapter 9 Connecting to and Setting up a Network
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Unit 11 - Computer Networks Assignment B: Design a Computer Network
NAS-7101 / NAS-7201 TorrentFlux Utility Installation
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
hotEx RADIUS Manager Installation
Getting to Know the Digital Hub Can you sketch/draw the digital hub system – subsystems? Can you Identify Point of failures?
TEW-691GR Training TEW-691GR Training TEW-691GR 450Mbps Wireless N Gigabit Router.
Case Study: Pat Lee’s Home PC Network Chapter 1a Updated January 2007 Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Securing a Wireless Network
Working From Your Home Computer Safely: The Ten Commandments Stephen Jones, GSEC, A+ With special thanks to Balakrishnan Ramachandran.
DSL 305 Series ADSL Modem. Types of DSL305 series DSL305E ADSL Modem  PPP Half-Bridge (Default)  Transparent Bridge DSL305EU ADSL Router/Modem.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
TEW-812DRU Training. TEW-812DRU AC1750 Dual Band Wireless Router.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Chapter 7 Microsoft Windows XP. Windows XP Versions XP Home XP Home XP Professional XP Professional XP Professional 64-Bit XP Professional 64-Bit XP Media.
Tutorial 11 Installing, Updating, and Configuring Software
Learning In A Techno World How Safe is Your Cyberspace?
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Module 13: Maintaining Software by Using Windows Server Update Services.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
DSL-2544N Dual Band Wireless N600 Gigabit ADSL2+ Modem Router
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Windows 7 Release Candidate 1 Overview Some slides are screenshots made while the test computer was connected to a network with other computers and Internet.
Local Network for 3GPP Meeting 1. Directory Configuration for 3GPP Meeting 2. How to connect your PC to Local Network 3. Set Up for Microsoft NetMeeting.
HotEx Radius Manager Installation. hotEx RADIUS Manager Network Diagram.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NetTech Solutions Protecting the Computer Lesson 10.
Lesson 20. E-commerce Software Intershop Enfinity WebSphere Commerce Professional Edition Microsoft Commerce Server 2002.
Page 1 of 38 Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Please Note: Information contained in.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Windows Administration How to protect your computer.
Agenda Last class: Computer Software Today: –Task Manager, Control Panel.
Prepared by : Nur Syafikin Shaheera bt Mat Zaini TSK Prof Madya Mohd Hazali bin Mohamed Halip.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Windows Vista Configuration MCTS : Network Security.
Networks and Security Great Demo
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Managing Windows Security
Introducing, Installing, and Upgrading Windows 7
Chapter 2 Overview of Networking Components
Em4 Ethernet tutorial Remote connection.
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Lesson #10 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 10 Configuring Network and Firewall Settings.
Printers.
Home Security in the Age of Broadband
Presentation transcript:

Bullet-Proofing Your Wireless Router By Steve Janss

Copyright Jansys Information Systems - All rights reserved Bullet-Proofing Your Wireless Router How to tweak your wireless router to obtain maximum protection

Copyright Jansys Information Systems - All rights reserved But First!  A quick example of one of the many thousands of stupid things one can do on a computer…

Copyright Jansys Information Systems - All rights reserved Overview  Before you start…  Firewall basics  Physical installation  Firmware upgrades  Tweaking your router’s settings

Copyright Jansys Information Systems - All rights reserved Before you start…  Update Windows  Update Office  Update Antivirus –Live Update –Default settings –Full system scan  Run Ad-Aware:  Run Spybot:  Require ctrl-alt-del to log on

Copyright Jansys Information Systems - All rights reserved Microsoft Updates  Open Internet Explorer  Help, Online Support  Downloads and Updates  Microsoft Windows Updates  Microsoft Office Updates  Automatic Updates

Copyright Jansys Information Systems - All rights reserved CTRL-ALT-DEL  Start  Control Panel  User Accounts  Change the way users log on or off

Copyright Jansys Information Systems - All rights reserved

Firewall Basics  Linksys WRT54G –Wireless Router with a built-in firewall  NAT – Network Address Translation –Separates internal and external network traffic –Hackable – requires internal client (trojan)  Access Restrictions –IP address –MAC address  WPA Shared Key

Copyright Jansys Information Systems - All rights reserved NAT  Network Address Translation –Separates internal and external network traffic –Hackable – requires internal client (trojan) 

Copyright Jansys Information Systems - All rights reserved Physical Installation  Install, upgrade, and configure router first!  Do not connect router to Internet until completely configured  Install, update, and configure NIC last  Instructions! –Quite good… –Ensures correct order (drivers vs hardware vs Windows Auto Detect)

Copyright Jansys Information Systems - All rights reserved Firmware  Software for “edge devices” like hubs, switches, routers, etc.

Copyright Jansys Information Systems - All rights reserved

Firmware Files

Copyright Jansys Information Systems - All rights reserved

The Password Is… admin Please give your friendly neighborhood hackers a hard time by changing it! Use the same strong password rules enforced at work

Copyright Jansys Information Systems - All rights reserved

Accessing The Router

Copyright Jansys Information Systems - All rights reserved

Summary  Available on the Seoul CC website  It’s really not that complicated…  You can easily undo your mistakes  So what’re you waiting for?

Questions? Thank you for coming!