Gal Leibovich Liran Manor Supervisor: Hai Vortman.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

Slide 1 of 7 Turning off Ad-Hoc Mode Ad-Hoc mode can be a real problem for wireless connectivity at meetings. Systems that accidentally enter.
Configuring Windows to run Dr.Web scanner remotely.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
A Better Mobile Location Landscape May 2008 Sam Altman, Co-founder and CEO.
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
Prepared By: Kopila Sharma  Enables communication between two or more system.  Uses standard network protocols for communication.  Do.
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
Network Hosts Analyzer Hadas Shumovitch Elad Levi Tal Katz
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Academic Advisor: Prof. Ronen Brafman Team Members: Ran Isenberg Mirit Markovich Noa Aharon Alon Furman.
Computer Science Patent Ideas Team JABS Group # 1 Joanne Akshay Boaz Siddharth.
802.1X in Windows Tom Rixom Alfa & Ariss. Overview 802.1X/EAP 802.1X in Windows Tunneled Authentication Certificates in Windows WIFI Client in Windows.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
XP 1 New Perspectives on Microsoft Windows XP, 2005 Service Pack 2 Update Appendix D Microsoft Windows XP, Service Pack 2 Update Appendix D – Setting Up.
8/10/2015Windows 71 George South. 8/10/2015Windows Windows Vista Windows Vista was released in January 2007 some five years after Windows XP Vista.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Mobile Agents for Integrating Cloud-Based Business Processes with On-Premises Systems and Devices Janis Grundspenkis Antons Mislēvičs Department of Systems.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
Windows 2003 and 802.1x Secure Wireless Deployments.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
Object Oriented Databases by Adam Stevenson. Object Databases Became commercially popular in mid 1990’s Became commercially popular in mid 1990’s You.
Chapter 10: Authentication Guide to Computer Network Security.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Week 7 Lecture Web Database Development Samuel Conn, Asst. Professor
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: November 2011.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
2 Windows 7 – New Features DirectAccess Active Directory authentication without a VPN connection Firewall and NAT friendly with most existing network.
Architecture of.NET Framework .NET Framework ٭ Microsoft.NET (pronounced “dot net”) is a software component that runs on the Windows operating.
Meir Botner David Ben-David. Project Goal Build a messenger that allows a customer to communicate with a service provider for a fee.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Selecting the Right Network Access Protection Architecture
By: Surapheal Belay ITEC ABSTRACT According to NIST SP : “ Mail servers are often the most targeted and attacked servers on an organization’s.
Eduroam Louis Twomey HEAnet Library Services Day 20 th November 2014.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
NEARBY: HYBRID NETWORK MOBILE APPLICATION Shuai Zhang, Ziwen Zhang, Jikai Yin.
Module 14: Configuring Server Security Compliance
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Configuring Network Access Protection
Automated P2P Backup Group 1 Anderson, Bowers, Johnson, Walker.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
1. ◦ Intro ◦ Client-side security ◦ Server-side security ◦ Complete security ? 2.
NETWORKING & SYSTEM UPDATES
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Summary: Unlike WindowsXP, Windows2000 wireless client utilities are different from vendor to vendor and even within versions of a vendor’s client utility.
Step 1 Remove the wifi Network which is already connected.
Module 5 Configuring Wireless Network Connections.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Chapter Eight Internetworking with Remote Access.
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
Windows 7 Manual for Wireless connectivity at Libraries Table of Contents Windows 7 Connectivity a) Installing the Secure W2 EAP Suite b) Selection.
Group 8 Ian Carr, Chris Lemley, Clay Garrison, Alvaro Suarez, Amanda Williams.
Wireless Mesh Networking or Peer to Peer Technology Andre Lukito – Johnsonsu – Wednesday, 9.
Enhanced mobile services in Java enabled phones Björn Hjelt Sonera zed ltd Supervisor: Professor Jorma Jormakka.
Microsoft Windows Vista Updates, Patches, and Service Packs Jonathan Biddle Computer Science – Indiana University of Pennsylvania
Windows 8 and onwards Manual for Wireless connectivity at Libraries Table of Contents Windows 8 Connectivity a)Selection Of Wifi b)Selection of Setting.
How to convert a Demo to Multi-user
Customer Guide to Limited-Time Offer
[Company Name] Veeam Offerings
On and Off Premise Secure Access
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Working with Windows Vista
Install AD Certificate Services
Presentation transcript:

Gal Leibovich Liran Manor Supervisor: Hai Vortman

Background  Network security is one of the most challenging aspects of the data communication area, especially in wireless networks  A rapid growth in the number of wireless networks in the last few years The importance of taking measurements in order to secure the wireless networks is very high  A need for a tool which reports:  Diagnosis of security properties of nearby wireless networks  Offers recommendations for security improvement  Offers general recommendations about the wireless infrastructure (Bonus)

WSA Architecture  Based on Managed Wi-Fi library  A.NET class library allows you to control wireless network adapters that are installed on your Windows machine  The library wraps the “Native Wi-Fi API”, which: Contains functions, structures, and enumerations that support wireless network connectivity and wireless profile management Designed for C/C++ developers  Available since Windows Vista and Windows XP SP2 (only after applying a hotfix provided in KB article )KB article

WSA Architecture – Cont.  Four classes are used to implement WSA

DSSecurity Dataset  Two basic tables define the authentication and encryption algorithms  Only relevant combinations are held in two dedicated tables  Only one recommendation table will be used according to the user’s input – different recommendations for different user types  Easy updating