Peak Support Services Ltd Connecting & protecting your business...

Slides:



Advertisements
Similar presentations
Overview How to crack WEP and WPA
Advertisements

AARP Tax-Aide Sonoma/Napa District Bill Dornbush, TC Guide to Printer Sharing.
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
SMC2804WBRP-G Barricade™ g 2.4GHz 54Mbps Wireless Cable/DSL Broadband Router with USB Print Server SMC2804WBRP-G
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
CY-SWR1100 Dual Band Wireless N Router
Lecture Materials for the John Wiley & Sons book: Cyber Security: Managing Networks, Conducting Tests, and Investigating Intrusions October 12, 2014 DRAFT1.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
How to configure Linksys WRT-120N wireless Access-Point(AP) router
Technical Training: DIR-615
1 BASIC TELECOMMUNICATIONS Wireless fidelity x.
Internet Security In the 21st Century Presented by Daniel Mills.
Securing a Wireless Network
1 NTC TCS Training Dallas 2010 TaxWise Online (TWO) Practical Notes and TWO Wireless.
WhatsApp – Tweaking Security -The new face of Information Technology Services 1.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
How to configure Linksys WRT-120N wireless Access-Point(AP) router
Staying Safe Online Keep your Information Secure.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Hackers And Hacking.
Setting Wireless Network At Home By: Parveen Sharma.
Internet Security and Your Computer Welcome to Boot Camp.
Wireless Security on the Philippine Setting. Introduction: WHOAMI What’s this all about?
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Wireless Network Security By Simon Langford. About… This oral presentation is on wireless networks and the methods of security in use on them, in order.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Windows Administration How to protect your computer.
Securing your Personal Wireless Networks By: Bryan Oxendale.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Top 100 security tips. Topics Social Engineering Social Media Physical computer security Password security Smartphones Encryption Anti Virus Public computers.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Encryption Must Be End to End This is the job of SSL or TLS
Securing A Wireless Network
I S P S loss Prevention.
BP5 – encryption - Fun gym
BP5 – encryption - Fun gym
Web Servers / Deployment
Unit 4 IT Security Kerris Davies.
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

Peak Support Services Ltd Connecting & protecting your business...

Did you know... Consumer Wireless is up from 34% now at 78% % of all UK Businesses have a wireless access point. 57% of Businesses have ineffective or no encryption. (Nov.2009) 30% of Businesses leave default passwords on routers. 6/10 people admit to Online Banking at work. 7/10 people believe Anti Virus packages will protect their internet surfing.

Hacking Methods... Brute Force / Dictionary Attack – A WEP key consists of 5 OR 13 characters –takes 1 – 24 hours. ARP Poisoning – Scanning and acting as a router so all data goes through hackers laptop. DHCP Spoofing – Hacker tries to issue an IP before the router can. DNS Poisoning – Gaining access to the router, they can change the DNS to redirect to any non- legit websites.

Recent Example... Computer Recycling Firm in London OVERALL RESULT Sage Line 50 CCTV system Accounts All Documents Backup Reset Passwords Remain Invisible and capture packet data.

Do’s and Don’ts DO - ALWAYS Set a password with WPA or above. DO - If possible hide the network name(SSID). DO – Make sure passwords are complex and not easy to remember. DO – If possible, switch off your wireless router when not in use. DON’T – Connect to an unknown Access Point unless absolutely certain its secure. DON’T – Leave the default password on your router.