Securing a Wireless Home Network BY: ARGA PRIBADI.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Securing A Wireless Home Network. Wireless Facts Range about feet from access point Security anyone can eavesdrop on an unsecured wireless network.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness Chapter 5 Wireless Network Security.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
A Guide to major network components
Computer Networks IGCSE ICT Section 4.
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Wireless Networking 102.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Chapter 5 LANs and WANs. Network Building Blocks Chapter 5: LANs and WLANs 2  Network Classifications  LAN Standards  Network Devices  Clients, Servers,
Wireless Networking and Security
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Networks. Network Classifications Acronyms, acronyms, and more acronyms What does PAN stand for? – Personal Area Network – interconnection of personal.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
LOCAL AREA NETWORK A local area network (lan) is a communication network that interconnects a variety of data communicating devices within a small geographic.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
Presented by: Dr. Munam Ali Shah
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
PRESENTATION ON WI-FI TECHNOLOGY
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Computers Are Your Future Eleventh Edition
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
 LANs and WLANs LANs and WLANs1.  Network Building Blocks  Wired Networks  Wireless Networks  Using LANs  Security Through Encryption LANs and WLANs2.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Components of wireless LAN & Its connection to the Internet
Lecture 24 Wireless Network Security
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Networks CSC September 23,
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
ICT Unit 4: Network and the effects of using them
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Chapter 5 LANs and WLANs.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Securing A Wireless Network
SUBMITTED BY DINEEJ A 28 S3 EC
Wireless Network Security
Chapter 6 Networks Communicating and Sharing Resources
Wi-Fi Technology.
Presentation transcript:

Securing a Wireless Home Network BY: ARGA PRIBADI

Wireless Facts  Signal Range  Approx 50 – 200 FT from access point unblocked  Security  Anyone can eavesdrop on an unsecured wireless network

What is LAN?  Stands for Local Area Network  Computer Network interconnected with other computers within a limited area  wide variety of LAN topologies have been used, including ring, bus, mesh and star, but the most common LAN topology in use today is switched Ethernet

Difference between wireless and wired LAN  LAN is much more faster and secure  Must physically be connected to switch or router to steal information  Up to 1Gbps transfer speed  WLAN is slower and much less secure  Vulnerable to attacks from outside  Limited to 54mbps

Sample of LAN

Sample of WLAN

WLAN  How it works  All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers  Wireless base station has to signal existence to allow devices to connect  Makes it vulnerable for attackers with strong transceivers

Types of attacks  Passive Attack: These attacks are not harmful to the networks; they take place for information-gathering. A malicious user just listens to the all inbound and outbound traffic of a wireless network.  Active Attack: As the attacker does a passive attack in order to get information about the wireless network, now she/he will do an active attack. Mostly, active attacks are IP spoofing & Denial of Service attack.  MITM Attack: Here the attacker accesses the information of the AccessPoint of any active SSID. Here dummy APs are created. The attacker listens the communication between to end points.

Consequences of Attacks  Things that could happen  Attack on laptops and workstations on the network  Steal internet access  Steal information transmitted over wireless network

Attack on Laptops and workstations  Attempt to steal data from hard drives  Damage data on hard drives  Planting malicious software to attack other computers  Attacks are traced to your computer not the attacker’s

Stealing internet access  Attacker joins your network, uses internet gateway  Things attacker could be doing while on your network  Downloading child porn  Torrent illegal files  Broadcast Spam  Attacks are traced to your network

How simple it is too attack WLAN  It is very simple  All you need is a laptop, wireless card, and some software  Directional antenna will boost the range from where you can access network  Directional antenna can be made from Pringles can

How do keep attackers out home WLAN  Change the service set identifier (SSID)  Change router password  Shutoff base station’s SSID broadcast  Enable (wireless protected access) WPA or WPA2 encryption

Changing SSID  To gain access to LAN you need SSID of router  Default SSID can be easily guessed such as (Linksys, Motorola)  Works best with previously stated security measures

Change Password  To access LAN you need router/base station password  Most default passwords are manufacturer’s name  Changing the password would drastically reduce chance of attacks

Close Your Network  Shutoff SSID broadcast  Reduces chance attacker sees your network  If you can’t see it you can’t steal it

Enable wireless encryption  Encrypt network traffic  Has to be done on base station and all access points, wireless adapters, etc.  All devices use the same WPA or WPA2 keys  Use WPA or WPA2 preferably WPA2  Wifi Alliance

Setting up wireless security  Make all security changes through a wired link  Changing settings wirelessly could encounter connection loss when applying changes  Set up devices in order:  Base station (cable/DSL/modem)  Access points  Test each device for connectivity before finalizing installation location

IBM network security 

Conclusion  Change default admin usernames and passwords  Change default SSID  Disable SSID Broadcast  Turn on WPA Encryption

References  network network   wpa2.htm wpa2.htm  network-connections.htm