Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

1Dr. Tahseen Al-Doori. KIC Scenario Learn the Basics of Ad Hoc wireless networks Create a wireless Ad Hoc network with two Windows clients Secure the.
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Presented by Serge Kpan LTEC Network Systems Administration 1.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
TEW-691GR Training TEW-691GR Training TEW-691GR 450Mbps Wireless N Gigabit Router.
Wireless Network Security Overview 無線網絡系統保安概覽. ASL experience in school projects Whole School Wireless Rollout Wireless Networking Project SAMS Project.
Topic Coverage – Consumer Why Wireless? Advantages of Wireless How Does Wireless Work – Consumer? Various Types x – A vs. B vs. G Which is best for.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
By David Chavez Wireless Laptops in Classrooms. Going Wireless! If you've been in an airport, coffee shop, library or hotel recently, chances are you've.
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 7 Connecting to the Internet. Connecting to the Internet FAQs: – What is the Internet? – What are the options for Internet service? – What is.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Basic Wireless Concepts & Configuration Chapter.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Year 10 – Chapter 4 – Computer Networks Lesson 2: Setting up a Network Starter Task – Can you think of reasons to set up a network? Why Use Networks? 1.
U of Maryland, Baltimore County Risk Analysis of Critical Process –Financial Aid Adapted STAR model –Focus on process and information flow –Reduced analysis.
What kind of technical infrastructure would be required? Team 4 I.T.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Networking Components Starla Wachsmann. COMPUTER NETWORKING COMPONETS Today’s wireless and enterprise networks are more complex than ever, delivering.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Components of wireless LAN & Its connection to the Internet
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Solving the Security Risks of WLAN Tuukka Karvonen
Security in Wireless Networks 458 Security Offense Debate: Wireless Security by Cisco Group DoubleDeuce Jibran Ilyas Frank LaSota Paul Lowder Juan Mendez.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Networking Components
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
IS3220 Information Technology Infrastructure Security
Introduction to Networking. What is a Network? Discuss in groups.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Statewide network and technology services from the New Jersey State Library Connecting people with information through libraries 1.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Last updated: 20 April 2006 Alberto Escudero Pascaul ItrainOnline MMTK Access Point Configuration Developed by IT +46 Based on the.
Year 11 – Chapter 4 – Computer Networks
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Local Area Network (WLAN)
Chapter 4: Wireless LANs
Configure a Wireless Router
LM 5. Wireless Network Security
Presentation transcript:

Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design

Overview Why Wireless? Security Bandwidth Cost

Why Wireless? ‘Fixed’ wireless network –Dubuque County Library Epworth Branch Wireless ‘HotSpot’ –What are you providing? –What are the risks? –What is the cost?

Security Wireless networks are basically insecure What can we do to fix it? –Throw money at the problem –Take steps to mitigate the risks

Securely Configured WLAN (translation $$$) - from Internet Security Systems Wireless LAN Security Technical Whitepaper

Security Risk Mitigation Do not use default configuration options on Access Points (wireless routers) – the bad guys know all of these! Use as much security provided by the Access Point as possible –WEP –WPA –Hide AP as much as possible

Security Risk Mitigation Cover only areas you want to have access. Leakage and maximum transmit power widen the attack surface. Client protection –Personal firewalls –Up to date virus scanners

Bandwidth b bandwidth is 11 Mbps g bandwidth is 54 Mbps What is your bandwidth out of the building? –all LAN and WLAN nodes share this pipe

Bandwidth Access points provide limited connectivity How many connected clients will you allow = how many Access Points you will purchase. More potential problems with configuration of APs

Cost SOHO vs Enterprise equipment Number of clients Security costs money –Hardware costs –Staff costs

Policies In lieu of money your WLAN policy is the key

Policies Before you implement WLAN consider –What you are offering and why –Security risks to your LAN –Cost of installation as well as cost of maintaining security –Impact on current infrastructure

Questions? –Slideshow –Links to resources –See especially the article from WebJunction entitled: Ten Steps to Wireless Internet Access in Your Library