Wireless policies & network lockdowns Deb Ranard Scott Matheson.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Deres Kifle Eshete University of Notre Dame April 6, 2004.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Al Williams / DLT October 13,2009
Designing a Home Network By Tabby Booth. Network Components Motorola Cable Modem Wireless 4 port Linksys Router Compaq Desktop Computer – NIC card HP.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Fermilab VPN Service What is a VPN ?.
1 Enabling Secure Internet Access with ISA Server.
1 BASIC TELECOMMUNICATIONS Wireless fidelity x.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Securing a Wireless Network
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Wireless policies & network lockdown. school computers OPAC/web only research computer full workstation student laptops.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
WIRELESS LAN SECURITY Using
By David Chavez Wireless Laptops in Classrooms. Going Wireless! If you've been in an airport, coffee shop, library or hotel recently, chances are you've.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Lexmark Wireless Printer Adaptor Instructions Step 1. For a Mac, go to network preferences/ select built-in-ethernet and click on TCP/IP tab and annotate.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
ExamSoft at BU LAW Boston University School of Law Office of Systems & Technology.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Deepnet Unified Authentication for Outlook Anywhere.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
Secure Systems Research Group - FAU Patterns for Wireless Web Services Nelly Delessy January 19, 2006.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
INDIANAUNIVERSITYINDIANAUNIVERSITY Indiana University Update Tom Zeller
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
DHCP – Wireless Auth Standards stuff January CSG – Duke
Cabling – Horizontal and Vertical Everything you never really wanted to know…
Access Control Chapter 3 Part 4 Pages 227 to 241.
LO2 Understand the key components used in networking.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Policies, Pitfalls and the Pursuit of BYOT Dave Mirra Jay Cooke Stafford County Public Schools.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Isolating and Protecting Devices on the Network A database-driven methodology Tom Zeller June 2008.
Methods of Securing Data in Windows Networks
CompTIA Security+ Study Guide (SY0-401)
Enabling Secure Internet Access with TMG
Securing A Wireless Network
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Wireless Network Security
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Web Servers / Deployment
Connecting Remotely Winter 2014.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Presentation transcript:

Wireless policies & network lockdowns Deb Ranard Scott Matheson

Where is Capital Using WAPs? Wireless Access Points (WAPs) in the classroom WAPs in student gathering/study areas WAPs in administrative & faculty areas

What does Capital Use to Secure WAPs? WEP (Wired Equivalent Privacy )  Used for encrypting authentication due to downtown location  Provides IP address Radius Server  Authenticates  Provides certificate to users

What do our WAPs Support? Laptops or devices with network card address (faculty/staff)  Register MAC address for Wireless card with IT Only Windows XP (students)  Need a laptop with Wireless card  Authenticate username/password  Obtain a certificate

How It Works: Step 1

How It Works: Step 2

How It Works: Step 3

How It Works: Step 4

How It Works: Step 5

Current Student Access Classrooms use WAPs to specifically deny network access to students  Encrypts & Authenticates student  Classroom WAPs then deny an IP address after authentication WAP Signal from Library WAP Signal from Classrooms

What are those Students doing? What are the students doing (no, really…)?  Check  Browse websites  Purchase products on Ebay  Download songs  Use TWEN  Follow classroom cites SoftLINK ( linksystems.com/product_comp.htm) linksystems.com/product_comp.htm

What’s the Big Deal? Faculty can’t detect a student is on the internet with Wireless Students could circumvent the Socratic element of surprise Students could cheat on exams

So, Why use WAPs Anyway? Expense of Wiring makes wireless attractive to budget managers Students want it ExamSoft has improved support for wireless laptop exams

Wireless Networking: We Can Do It What can internet access be used for in the classroom? Where are WAPs an appropriate solution? …But Should We?