Wireless(review). 802.11a (1999) 802.11a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Home Wireless Security David Mitchell 12/11/2007.
Security in Wireless Networks Juan Camilo Quintero D
WIRELESS NETWORKS - A.HARIKA Y5CSO28. INTRODUCTION It refer to a telecommunication networks whose interconnections between nodes is implemented without.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
D-Link International Call Center Training and Staff Development Department Module: DAP-1350 Module: DAP-1350.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Securing a Wireless Network
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Wireless Networking.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Course ILT Portable computers and devices Unit objectives Identify, install, and troubleshoot notebook components Identify, install, and troubleshoot handheld.
1 Chapter Overview Wireless Technologies Wireless Security.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking (Part 4 of 5)
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Secure Systems Research Group - FAU Wireless Web Services Security Christopher Lo.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Wireless Networking.
Upgrading and Expanding Portable Computers. Expansion ports are common on notebooks, which allow the user to add external devices to the computer.
Working with Mobile Computers Lesson 12. Skills Matrix Technology SkillObjective DomainObjective # Configuring Vista Wireless Networking Use the Network.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Wireless Networks Tamus, Zoltán Ádám
Parts Of Computer Networks What makes them work!.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Chapter 19 Upgrading and Expanding Your PC. 2Practical PC 5 th Edition Chapter 19 Getting Started In this Chapter, you will learn: − If you can upgrade.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
REST OF THE COMPUTER BEFORE THE INTERNET. Understand Your Computer  Bit  Binary digit  0 or 1  Byte  8 bits  Unique combinations of 8 bits of 0s.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Chapter 19 Upgrading and Expanding Your PC
Computer Information Systems
TERMINOLOGY Define: WPAN
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
Wireless Local Area Network (WLAN)
How To Set Up A Wireless Network
Wireless Networking Chapter 23.
Network Models, Hardware, Protocols and number systems
Network Hardware and Protocols
Presentation transcript:

Wireless(review)

802.11a (1999) a speed ◦ 54 Mb/s & frequency of 5 GHz Used by ◦ Government buildings ◦ Older style networks

802.11b (1999) b speed ◦ 11 Mb/s & frequency of 2.4 GHz Used by ◦ Legacy equipment

802.11g (2003) g speed ◦ 54 Mb/s & frequency of 2.4 GHz Used by

n (2009) n speed ◦ 54 Mb/s to 600 Mb/s ◦ frequency 2.4 & 5 GHz Used by

Wireless Security

Ad hock mode  Peer to peer Networking  Do you need an AP (Access Point)?  Made for small groups of people  Able to share printers  Transfer files  How do think this would come in handy?

Wireless encryption  Open Shared  WEP  WPA  WPA2

Opened Shared  No security?  Why use it?(who)

WEP  Wired Equivalent privacy ◦ One of the earliest encryption types. ◦ Uses 40-bit encryption or 104 bit encryption  How secure is it? ◦ No very secure -keeps the good people out- ◦ Not true end to end encryption

WPA  WI-FI Protection Access ◦ Battles WEP weakness by introducing TKIP  Temporary Key Integrity protocol (TKIP) ◦ TKIP provides a new inscription key for every sent packet  EAP (extendible authentication protocol)  This offered another way to authenticate other than MAC address (easy to sniff out).

WPA2  IEEE i standard or Wi-Fi protected Access 2  Introduced AES (advanced encryption standard) o Encryption 128,192,256-bits  Provides stronger encryption and cleans up some holes in WPA

WPS  Wi-Fi Protected setup (has 2 ways to configure) ◦ A button on your wireless device ◦ An 8 digit code that you input in on your device  Why? ◦ Your average technician can program a wireless WAP in about five minutes. ◦ Your average end-user is scared to do this.  BUT ◦ Security flaw!

Keep your Wireless LAN Safe  Turn off SSID broadcast  Turn off wireless access to Router  MAC address filtering  Change default IP address  Change default SSID

Portable computers Notebook Desktop replacement Netbook Ultra book Tablet PC's Tablets

Notebook & Desktop replacement components Notebook (everything can be considered a notebook) ◦ 10-17inch-Display screen ◦ Integrated graphics cards ◦ 2.5 Hard drive size ◦ Built in screen ◦ Pointer device ◦ IBM Track point ◦ Touch pad Desktop replacement ◦ Not light weight ◦ Dedicated graphics ◦ 1-2 TB Hard drive ◦ 16+ GB RAM

Netbook & Ultra book Netbook ◦ Light weight ◦ Good battery life ◦ 9 inch screen's ◦ Only for word processing Ultra Book (2011) ◦ Thin & light weight ◦ Netbook + desktop replacement ◦ Power of a desktop replacement that’s lightweight ◦ Permanent components

Native resolution XGA (eXtended Graphics Array) HD720 WXGA SXGA HD 900 UXGA (Ultra) HD 1080 WUXGA

Laptop FN FN Key ◦ Bluetooth button ◦ Wireless Button ◦ Brightness ◦ Volume ◦ Touchpad

Deadly Wireless Hardware Switch!

PCMCIA Personal computer memory card international association History ◦ Company that sets standards for personal computer. They specifically set standards on expansion cards. Parallel PC Card ◦ The older style laptops came with two 16-bit Slots. They came in three different types.

Types ◦ Older computers can accept two type 1& type 2 cards or one type 3 card.

Express card slots High- performance version of your parallel PC Card Two types Express Card /34 & express card / 54 Modern day card slot Same thickness as a type ii slot

Docking station Peace of Hardware that allows you to expand your ports external ports. Why do you need it? ◦ No one wants the desktop replacement/ and no one has enough money for an Ultra-book!