Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Wardriving 7/29/2004 The “Bad Karma Gang”. Agenda Introduction to Wardriving The Tools of Wardriving Wardriving Green Lake.
Wireless networking Roger Treweek Oxford University Computing Services.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Security. Why is it important? Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Over.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Securing Home Networks (including WiFi and Servers) By Dr. Rafael Azuaje, Sul Ross State University, Alpine, TX Home networks (wire/wireless) are becoming.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Computer Networks IGCSE ICT Section 4.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Romney Bake Brian Peterson Clay Stephens Michael Hatheway.
Securing a Wireless Network
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Networks CSC September 23,
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
Wireless Network Security
Chapter 6 Networks Communicating and Sharing Resources
Presentation transcript:

Wireless Network Security By Simon Langford

About… This oral presentation is on wireless networks and the methods of security in use on them, in order to prevent un-authorized access to the network. A wireless network is a medium to allow communication between computers using radio waves instead of fixed/hardwired cabling. Wireless networks have recently been the subject of intense scrutiny in regards to the security of them, we often hear stories about hackers gaining entry to wireless networks that are secured and stealing bandwidth and data. During this presentation I intend to investigate the methods of security for wireless networks and how safe they really are.

Securing your wireless network There are several steps you can take to secure your wireless network. These include the use of data encryption systems and an element of security by obscurity. There are three main types of data encryption available on standard wireless networks. These are: - WEP – Wired Equivalent Privacy - WPA – WiFi (Wireless Fidelity) Protected Access - WPA2 – WiFi (Wireless Fidelity) Protected Access version 2 WEP was the original encryption algorithm used on wireless networks, and is partially responsible for the reputation wireless networks have for being insecure. It uses a pre-shared key, however because of several design short falls, it is easy to break as the keys used for it are too short, and they are duplicated in static form on every packet encrypted with it sent across the network.

Securing your wireless network - continued WPA and WPA2 are built on the basics of WEP, however are much more secure. They use longer keys and do not leave parts of packets unencrypted like WEP. WPA and WPA2 offer several different methods of authentication onto a network, such as the use of radius servers for commercial environments and pre-shared keys for home and small office networks.

Security by obscurity In all good network designs, both wired and wireless, an element of security by obscurity should be used. These methods should not be used as stand alone security methods, but should be used in conjunction with a safe and strong encryption system such as WPA or WPA2. -MAC Address filtering on access points – allows only specified MAC addresses access to the network -Hiding the SSID (name) of the network – makes clients need to specify the name of the network, eg “Flinders”, “ASMS” etc. -Positioning your equipment so that the networks signal is available only in areas that you want it and are safe – prevent outsiders from obtaining a useable signal for access to the network -Changing default passwords on equipment – do not keep default usernames and passwords for network equipment, if an unauthorized user gains access to your network, they could potentially tamper with your networks setup.

Social Impacts of Vulnerable Wireless Networks Open and un-secure wireless networks can be very dangerous for their owners as they are potentially opening themselves up for everyone to see and in a sense inviting hackers to connect to the network. Once a hacker connects to an open network they can, depending on the structure of the network, access files and folders of the owners; often containing personal and confidential material or steal internet bandwidth. As well as the potential ramifications of confidential files getting into the wrong hands, Internet bandwidth theft is also a very serious matter. If someone else you do not know uses your connection for illegal activity and they are tracked, then you could potentially be blamed and linked by your account to that activity.

Can wireless networks be secure? Wireless networks can be safe providing some effort is put into their implementation. An encryption algorithm must be used at an absolute minimum and you can take additional steps outlined on the previous page to ensure further network safety. Any network that has had some effort put into its setup will be 99% safe from even the most determined hackers. Most hackers/snoopers tend to go for the easy targets, that is the un-encrypted networks, and most often the objective of their efforts is only to use your internet connection!

How widely in use are wireless networks? Wireless networks are becoming very widely in use across Adelaide. Below is an image compiled by Geordie Millar and myself of individual wireless networks stumbled from September to December last year. Map of Adelaide and surrounding areas. Generated by wigle.net

Sources The realm of accumulated knowledge and real world experience of Simon Langford Map of wireless networks from wigle.net. Constructed from data uploaded by Geordie Millar and Simon Langford Consultation with self proclaimed WiFi expert Geordie Millar on the workings of WEP and WPA.

Ok, So Wireless Networks can be secure, but are they safe? wireless-devices.html Shock! Horror! Wireless routers emit radiation!