Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Internet Protocol Security (IPSec)
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Module 8 Configuring Mobile Computers and Remote Access in Windows 7.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Introducing Windows 7 Lesson 1. Objectives Define Windows 7 interface refinements Describe new features of Windows 7 Describe the six editions of Windows.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Troubleshooting Mobile Connectivity Problems Lesson 4.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Chapter 7: Using Windows Servers to Share Information.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Working with Mobile Computers Lesson 12. Skills Matrix Technology SkillObjective DomainObjective # Configuring Vista Wireless Networking Use the Network.
Week #7 Objectives: Secure Windows 7 Desktop
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Understand Encryption LESSON 2.5_A Security Fundamentals.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Windows Vista Configuration MCTS : Mobile Computers.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Using Mobile Computers Lesson 12

Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections

Understanding Wireless Security Easy to establish a wireless connection, but a secure one is more difficult. Some types of attacks common to unsecured networks: – Eavesdropping – Masquerading – Attacks against wireless clients – Denial of service – Data tampering

Evaluating Wireless Networking Hardware IEEE standards (p. 448) Newer devices can fall back to support older devices at lower speeds. Security protocols are not backward compatible: – Wired Equivalent Privacy (WEP) – WiFi Protected Access (WPA and WPA2)

Using Wired Equivalent Privacy (WEP) Uses a security setting to encrypt network traffic – Secret or shared key Administrators must configure all devices with the same shared secret key Relatively weak cryptography

Using Wi-Fi Protected Access (WPA and WPA2) Addresses the weakness of WEP Two encryption options: – Temporal Key Integrity Protocol (TKIP) – Advanced Encryption System (AES) WPA has two operational modes: – WPA-Personal (WPA-PSK) – WPA-Enterprise (WPA-RADIUS)

Configuring Wireless Networking Manual configuration for wireless adapters that are supported directly by Windows 7

Windows Mobility Center Provides quick access to configuration settings used by mobile computer users

Configuring Mobile Display Options One of the benefits of mobile computing is the ability to collaborate with others. Display configurations are often changed to accommodate viewing: – Connecting an external display – Configuring multiple displays – Using a display projector

Configuring Presentation Settings Configuration settings that users most often adjust before giving a presentation

Configuring Power Options Power consumption is a critical issue for laptop users who rely on batteries.

Synchronizing Data For users who connect to a network when in the office and need to take files with them when they are not connected Two types of synchronization: – One-way – Two-way

Using Offline Files A form of fault tolerance Workstations copy server-based folders to the local drive Users can work with the files whether the network is operational or not, or even if they disconnect from the network When the workstation reconnects, synchronization of the files occurs

Transparent Caching Causes Windows 7 to save copies of files accessed on a remote server on a local drive Do not remain available when disconnected from the network Provides users with faster repeat access and conserves bandwidth Similar to BranchCache feature, except cached files are not shared with other workstations

Using Sync Center Central control panel for all synchronization partnerships Pairs of folders or devices are configured to synchronize their data on a regular basis

Using BitLocker First released in Vista, and now available with Windows 7 Enterprise and Ultimate Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive: – Increased data protection – Integrity checking

Understanding BitLocker Requirements Computer must have a Trusted Platform Module (TPM) and a compatible BIOS. Has 5 operational modes: – TPM + startup PIN + startup key – TPM + startup key – TPM + startup PIN – Startup key only – TPM only GPO: Require additional authentication at startup – Computer Configuration\Policies\Administrative Templates\Windows Componets\BitLocker Drive Encrytion\Operating System Drives\Require additional authentication at startup

Turning on BitLocker

Using Data Recovery Agents (DRA) A user account authorized to recover BitLocker drives with a digital certificate on a Smart Card Must be configured using Group Policy in an AD DS Must enable DRA recovery for each type of BitLocker resource you want to recover (p. 478)

Using BitLocker To Go New feature in Windows 7 Enables user to encrypt removable USB drives – Flash drives and external HDs

Using Remote Network Connections For travelling or telecommuting users who must connect to the company network from a remote site: – Dial-up – Virtual Private Networking (VPN) – Direct Access (new)

Understanding Virtual Private Networking Dial-up Connection – Point-to-Point Protocol (PPP) Virtual Private Network (VPN) - tunneling

VPN Protocol Encapsulation Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) – Using IPsec Secure Socket Tunneling Protocol (SSTP) Internet Key Exchange, Version 2 (IKEv2)

Creating a VPN Connection

Using VPN Reconnect When a VPN was interrupted, users had to manually re-establish the connection. Wireless has made this more of a problem. VPN Reconnect enables a computer to reconnect automatically.

Introducing DirectAccess Replacement for VPN Eliminates the need for clients to manually establish wide area connections to their networks Automatically connects to the network when connected to the Internet

Understanding the DirectAccess Infrastructure Invisible to the client, but complicated communications process with a long list of back- end infrastructure requirements: – IPV6 – Globally routable addresses – Ipsec – Provides additional security – Extensive Server requirements – Clients running Windows 7 Ultimate or Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server

DirectAccess Setup

Skills Summary Windows Mobility Center is a shell application that provides a central point of access to configuration settings that mobile computer users need. Configuring external displays is a common task for mobile computer users. Power settings allow you to control the power consumption of components in your mobile device. Offline files store copies of network files on the local drive, for use when the computer is disconnected.

Skills Summary (cont.) Sync Center is a central control panel for all of the synchronization partnerships. BitLocker encrypts all of the files on a volume and performs an integrity check before it permits the system to start. Dial-up or virtual private network (VPN) connections enable users to connect to a network from remote locations. DirectAccess simplifies the remote connection process for inexperienced users.