Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Awareness Chapter 5 Wireless Network Security.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Wireless LAN Security Shala VanGerpen December 8 th, 2005.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Configuring your Home Wireless Network Configuring your Home Wireless Network Adapted from Presentation at APCUG By Jay Ferron ADMT, CISM, CISSP, MCDBA,
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Securing a Wireless Network
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Wireless Networking 102.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Securing Your Home Computer Securing Your Home Computer Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Protecting Your Wireless Network Protecting Your Wireless Network University of Tasmania School Of Computing 2007.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Components of wireless LAN & Its connection to the Internet
Lecture 24 Wireless Network Security
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
NETWORK COMPONENTS BY REYNALDO ZAMORA. HUB Hubs are devices that serve as the central connection for a network. Its job is to send data from one computer.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
NETWORKING COMPONENTS Mujeeb Alikhan LTEC Hub A hub connects to multiple computers in a network. When traffic is transmitted thru the hub all devices.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Understand Wireless Security LESSON Security Fundamentals.
Module 9: Configuring Network Access
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Local Area Network (WLAN)
Wireless LAN Security 4.3 Wireless LAN Security.
Presentation transcript:

Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI

Questions How many of you have more than one computer at home? How do you connect to the Internet (DSL, cable, dialup)? How many already have a home router? Already have a wireless router?

Agenda What is a Home network Connecting things together Firewalls and Filtering Setting up a home router Setting up Print and File Sharing Questions

Home Network One or more computers connected: To the Internet with a router To the Internet with a router To each other in order to share Resources: To each other in order to share Resources: Internet Connections Sharing Files Sharing Printers

What is a Router Connects one network to another Sometimes called a “Gateway” In our case it connects to your cable modem or DSL Line Routers keep track of IP addresses and physical (MAC) addresses of hosts Managed (As we shall see)

What is a Cable/DSL Modem Usually provided and controlled by your ISP Connects your home to the Internet. This is the device that gets your public IP address Normally has no firewall protection Make sure you use the right cable

What is a Firewall A device the filters packets or traffic Its job is to be a traffic cop You configure the firewall: What will allow to pass What will allow to pass What will it block What will it block Hides your home network from the outside world Can be either in hardware or software

Firewall Protection 1.Implement a firewall (checks incoming traffic at the network before it gets to your home network) Default – Blocks all Incoming connections 2.Leaving you home network default is allow all outbound connections 3.Hardware firewalls protect you home network by stop all traffic before it get to your computers 4.Personal software firewall on your computer blocks incoming and outgoing (lets you know what is leaving your computer) Firewall Home Network Internet

Firewall Routers The idea is layers of protection Examples of home combo units include Dlink Dlink Dlink Netgear Netgear Netgear Linksys Linksys Linksys

Software Firewalls Add additional protection by: Controlling what leaves your computer Controlling what leaves your computer Adding a second level of protection Adding a second level of protection By being aware of application level attacks By being aware of application level attacks By allow you to schedule By allow you to schedule Usage of the internet by time (control access at night) By location (block content for young children)

Software Firewalls for Home Use McAfee Firewall McAfee Firewall Symantec’s Norton Personal Firewall Symantec’s Norton Personal Firewall Zone AlarmZone Alarm (Free) Zone Alarm Computer Associates with Firewall (free) Computer Associates with Firewall (free) Windows Firewall in XP Service Pack 2 (free)

Wireless What is wireless Wireless Networking Standards a, b, and g a, b, and g Recommend a standard “g” model Recommend a standard “g” model Wireless Security Standards Recommend Wired Equivalent Privacy (WEP) Recommend Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA)

Wireless Network Standards StandardDescription ●A group of specifications for WLANs developed by IEEE ●Defines the physical and MAC portion of the data link layer a ●Transmission speeds up to 54 megabits per second (Mbps) ●Works well in densely populated areas b ●11 Mbps ●Good range but susceptible to radio signal interference g ●Enhancement to and compatible with b ●54 Mbps, but at shorter ranges than b 802.1x ●Authenticates clients before it lets them on the network ●Requires greater hardware and infrastructure investment

Lesson: Introduction to Securing Wireless Networks What are the benefits of wireless networks? Common threats to wireless security Wireless network standards Guidelines for using security to mitigate risks to wireless networks Wireless network architecture

What Are the Benefits of Wireless Networks? ● Mobile users moving between offices save time and effort with a transparent connection to the corporate network ● Users can use , electronic calendars, and chat technologies when away from their desks ● The cost of provisioning network access to buildings is substantially lowered ● The network can be easily scaled to respond to different levels of demand when the organization changes Operational benefits: Business benefits:

Common Threats to Wireless Security ● Eavesdropping ● Spoofing ● Interception and modification of transmitted data ● Freeloading ● Denial of service ● Rogue WLANs ● Eavesdropping ● Spoofing ● Interception and modification of transmitted data ● Freeloading ● Denial of service ● Rogue WLANs

Guidelines for Using Security to Mitigate Risks to Wireless Networks Specify the use of software scanning tools to locate and shut down rogue WLANs on your corporate network If you allow unauthenticated access to your wireless network, require a VPN connection to access the corporate network Require data encryption for all wireless communications Require 802.1x authentication to help prevent spoofing, freeloading, and accidental threats to your network

Wireless Network Architecture BSS DS ESS IBSS STA AP

Demo: Wireless Devices Clearsight Scanner

Demo: How to configure Wireless Firewall/router Example: Basic Settings Basic Settings Wireless Settings Wireless Settings Backup Settings Backup Settings Set Account name and password Set Account name and password Blocking and Filtering Blocking and Filtering

Steps to protect your wireless network 1.Change the default password on your router 2. Enable WEP on router and wireless workstation 3.Use MAC address filtering 4.SSID broadcast of 5.Prohibit Peer-to-peer (Ad Hoc) networking 5. Keep current on hardware bios upgrades

Demo: Rogue Wireless Devices AirSnare

Weak Passwords Your computer password is the foundation of your computer security No Password = No Security No Password = No Security Old Passwords & Same Password = Little Security Change the “administrator” password on your computer

Questions FOR COPIES OF THIS DECK