Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.

Slides:



Advertisements
Similar presentations
Wireless network security Lt. Robert Drmola, University of defence, Communication and information system department.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
How to Secure a Home Wi-Fi S. Roy. Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Securing a Wireless Network
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Hotspot Security
1 Chapter Overview Wireless Technologies Wireless Security.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Copyright Security-Assessment.com 2004 Security-Assessment.com Wireless Security By Nick von Dadelszen.
Wireless Networking & Security Greg Stabler Spencer Smith.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Setting Wireless Network At Home By: Parveen Sharma.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
 Today’s networks are no longer limited to using cabled, or wired, devices.  Today’s networks have a mix of wired systems along with wireless systems.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
James Tucker Dr. Durrett ISQS 6342
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
How To Set Up A Wireless Network
Security of a Local Area Network
Presentation transcript:

Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points

1) Control the Broadcast Area Limit directionality and signal strength

2) Lock Down all Access Points Change Default Administrative Logins Change Name (if possible) Create Substantial Passwords ( 3) Assure no Rogue Access Point (AP) Only Known AP’s (

4) Disable SSID Broadcasts Craft Service Set Identifiers (SSID’s) Avoid company, address, or person names

5) Limit Access Limit to Known MAC Addresses Known machines & air cards 6) Limit Number of User Addresses If few (<80), limit DHCP Addresses Assigned If all try but some can’t => unauthorized log-ons

7) Use a Firewall supporting VPN Connections Always use VPN to Connect to Network from Outside Net

8) Use Encryption 128-bit WEP (wireless equivalency protocol) minimum WPA (Wi-Fi protected access) preferable All or None – every wireless device on network must be WPA Pre-Shared Key -- no authentication server required Network Authentication option -- WPA-PSK Select TKIP as encryption type – AES available but not universally