Securing A Wireless Home Network. Simple home wired LAN.

Slides:



Advertisements
Similar presentations
RhodesAZ Consulting, LLC
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
How To Set Up A Wireless Network Using A D-Link Wireless Router
Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Bag-O-Bytes October 6 th, 2004 Home Networking Presented by The FPB Help Desk x6322.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness Chapter 5 Wireless Network Security.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Wireless LAN Security Shala VanGerpen December 8 th, 2005.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
DIR-505 All-in-One Mobile Companion Greg Quinlan Technical Trainer.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
How to Secure a Home Wi-Fi S. Roy. Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
You see, wire telegraph is a kind of very, very long cat. You pull his tail in New York and his head is meowing in Los Angeles. Do you understand this?
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
Wireless Networking 102.
Basic Network Training. Cable/DSL Modem The modem is the first link in the chain It is usually provided by the ISP and often has a coax cable connector.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
CPT 123 Internet Skills Class Notes Internet Security Session A.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
Setting Wireless Network At Home By: Parveen Sharma.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Securing your Personal Wireless Networks By: Bryan Oxendale.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
LINCWorks Mesh Networking User Guide. This user guide will give a brief overview of mesh networking followed by step by step instructions for configuring.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
ICT Unit 4: Network and the effects of using them
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Secure Networks It’s not just for your office Dial-In Number: Meeting Number:
Introducing, Installing, and Upgrading Windows 7
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
Wireless Network Security
How To Set Up A Wireless Network
Chapter 6 Networks Communicating and Sharing Resources
Presentation transcript:

Securing A Wireless Home Network

Simple home wired LAN

Simple home wireless LAN

Wireless LAN Wireless base station has to signal its existence so clients can connect (you laptop or other devices) Attackers of wireless LANs therefore need to be kept out!

Types of attacks  Attack laptops and workstations on the network  Steal information being transmitted over your wireless network  Steal Internet access through your Internet

What Happens When Your Laptop and Workstation are Attacked?  Attacker attempts to steal data from hard drives  Attacker attempts to damage the data on the hard drives  Attacker plants malicious software to attack other computers  Attacks can be traced to your computer, not his or hers!

Attacks to steal Internet access  Attacker’s computer joins your network, uses your Internet gateway  Attacker could be (for example): –Downloading copyrighted music files –Downloading child pornography –Broadcasting spam –These can be traced back to your Internet connection

How easy is it to attack a wireless LAN?  Very easy  All an attacker needs is a laptop computer, a wireless card and some software  A directional antenna will increase the range over which the attacker can access your network  Directional antenna can be made from a Pringles potato chip can!  Attackers drive around with their computers looking for open wireless networks

Why is it so easy to invade a wireless LAN?  Ease of setup  Default settings allow even people with limited technical skills to set up and run a basic wireless network  Allows wireless users to use open, public networks (usually for Internet access) Ex. Such as the one at your local Starbucks

How do you keep attackers out of your home wireless LAN?  Secure the network  Change the service set identifier (SSID) of your base station  Change your base station’s password  Shut off your base station’s SSID broadcast  Enable encryption (WPA or WPA2)

Changing your SSID  To access the LAN you need the service set identifier (SSID) of your base station  Changing the default SSID reduces the chance the attacker will be able to guess it (it may be called default, Linksys ex.)  Works best with other security measures

Change your password  To access the LAN you need the base station’s password  Changing the default password (often ‘admin’ or ‘password’) drastically reduces the chance the attacker will be able get into your network

Close your network  Shut off SSID broadcast  Reduces chances that the attacker can see your network at all  Like parking your car in a closed garage –If the thief can’t see it, he won’t know that it’s available to steal

Enable wireless encryption  Encrypt your network traffic –This has to be done on the base station and all access points, wireless adapters, etc. All devices use the same WPA or WPA2 keys  WPA or WPA2 (Wi-Fi Protected Access) Don’t forget yours; write it down

WPA & WPA2-Personal  Choose this option to protect your network with Wi-Fi Protected Access.  Choose Password and enter a password between 8 and 63 characters.  Wireless client computers using WPA or WPA2 can join the network.

Setting up wireless security  Make security changes in all devices (routers, access points, adapters, etc.) through a wired link –If you change a device setting through a wireless link, you could lose the connection when you apply the changes –Set up devices in this order: Base station (Cable/DSL modem) Access points –Test each device for connectivity before you install it in its final location

Wireless security is not perfect  However, many simple measures can be taken to make the job harder  Wireless LAN security is not perfect but if you make it difficult enough, attackers will pick other targets

Let’s Get to Work!  Change Default Administrator Passwords and Usernames  Change the Default SSID  Disable SSID Broadcast  Turn on WPA Encryption

Default User Names and Passwords  Linksys Comcast  User Name: comcast Password: 1234  Linksys  User Name: [none] Password: admin  NetGear  User Name: admin Password: password  D-Link  User Name: admin Password: admin  Cisco  User Name: cisco Password: cisco  Apple Airport Extreme  User Name: [none] Password: admin