SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.

Slides:



Advertisements
Similar presentations
DSL-2730B, DSL-2740B, DSL-2750B.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Wireless Networking TGIF, April 18th, 2003 Alvin Chew Kent Reuber
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Awareness Chapter 5 Wireless Network Security.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Security Awareness: Applying Practical Security in Your World
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Wi-Fi Structures.
Chapter 9 Connecting to and Setting up a Network
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
How to Secure a Home Wi-Fi S. Roy. Acknowledgement In preparing the presentation slides and the lab setup, I received help from Professor Simon Ou Professor.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Securing a Wireless Network
TAX-AIDE Network Router Setup Network Printer Setups July SMT/TCS Training - Dallas1.
AP (Access Point) Client Operation Mode : Bridge Mode: AP IP Address: DHCP: Server Operation Mode : Bridge Mode: Client IP Address:
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
BASIC CONFIGURATION MODEM D-LINK
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Getting Started. Searching The best way to find information on the web: googling What search engines are there?
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Secure Networks It’s not just for your office Dial-In Number: Meeting Number:
Security fundamentals
Wireless Ethernet Programming
Instructor Materials Chapter 6 Building a Home Network
TECHNOLOGY GUIDE THREE
Securing A Wireless Network
Wireless Network Security
Wireless Modes.
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Introduction to Computers
Security of a Local Area Network
Chapter 12 Communications Security & Countermeasures
Design Unit 26 Design a small or home office network
SY604 NAT PPPoE Configuration
6. Application Software Security
An Introduction to Wireless Router Setups
Presentation transcript:

SOHO Security Recommendations

Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web site with this information Strong password  14 characters letters, numbers and symbols …… at least  Change it every 3 months ……. at least

Change the default SSID Service Set Identifier  Identifies the Wireless LAN The router has one from factory  LINKSYS6557  PRODIGY-2341  WIRENET4536 They give away mark/model  A search in google will give manufacturer and model  And configuration commands Eight characters long, minimum Alphanumeric and symbols Change the name “often”

Disable SSID broadcast Better to be anonymous  The attackers do not know of your existence They know there is network but the don't know the name The beacon frame carries the SSID

Enable WEP encryption …. at least WEP is not the best, but … it's better than not to have anything at all

Do not allow remote access Do not access your router remotely over the Internet  It is the default  Web server in the router (embedded) is dangerous If it is really needed  SSH or VPN (configure NAT)

Do not use default IP ranges Typical addresses are well known Network , Assign new ones manually The attacker will know less about your network Less information → more work OR Disable DHCP

Change the AP default IP address Everyone knows  , , , It is the most important device in your network  Hide its IP address

Logout after any configuration Logout from the router Some attacks work if an account is still authenticated  CSRF (Cross Site Request Forgery)

Do not enable WPS Wi-Fi Protected Setup Very easy to set up clients and repeaters But lately known flaws make it easier for attackers to find out your password

Enable MAC filtering Every one can enter the network If they cannot enter they cannot do anything They cannot receive anything Besides encryption not instead of But sometimes is the only viable solution  Big companies  ITESM

Adequate AP location Maximize internal reception  Get to every machine Minimize external reception  Machines from the outside cannot receive aproper signal

Enable the firewall You have MAC/IP addresses and port numbers  ……. and more Design good rules The AP/router is the first point of defense  And sometimes the only one

Monitor and Log Monitor wireless traffic  To identify unauthorized activity  WIDS  Review the logs Check for unknown devices Enable router logging  Device access, intrusions, attacks, etc Review the logs…………….periodically

Disable UPnP Universal Plug and Play Allows the discovery among devices and establish connections for data sharing Intended for residential networks  Connections from and to the Internet  Seamlessly Can you live without P2P?

Utilizar i Much more robust than WEP It is alittle more complicated (?), but ….....

Turn off the network when not in use Disable DMZ Disable unnecessary services Disable PING response

Don’t forget to update your router firmware PERIODICALLY