Wireless Network Security Overview 無線網絡系統保安概覽. ASL experience in school projects Whole School Wireless Rollout Wireless Networking Project SAMS Project.

Slides:



Advertisements
Similar presentations
The Next Step NSW DET Standards.  Standard (“fat”) Access Point(s) (AP’s) installed  Multiple laptops connected  Security provided by WEP or WPA (or.
Advertisements

INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Ruckus Planner powered by AirMagnet. 2 Why should you use Ruckus Planner?  Ruckus AP’s are easier for planning.. Resellers can verify with 3 rd party.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Flexible Network Access Overview. Flexible Access an Integral part of Universal Access Policy Universal Access to Campus IT Resources Managed LAN portsFlexible.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Mesh Network Technical Guide for the Mesh AP Topic 2 Installation Knowledge / Network Design Copyright © PLANET Technology.
Introduction to Wireless Networking. Basic Wireless and Wired Network.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
MESH Implementation With AP5131 version R.
Northeastern Illinois University. Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori.
Macau Polytechnic Institute I.T. Forum 2000 Campus Computing Environment & Technical Projects Presented by Voyage, Io Hio Hong.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
Presented by: Dr. Munam Ali Shah
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
WEP Protocol Weaknesses and Vulnerabilities
Wireless 101 Brian Heil Consultant, Ezrasoft Consulting & Design.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Wireless Network Design Principles Mobility Addressing Capacity Security.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless security Wi–Fi (802.11) Security
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network System Security - Task 2. Russell Johnston.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Wi-Fi Technology.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
INTRODUCTION TO COMPUTER NETWORKS
Methods of Securing LANs
SUBMITTED BY DINEEJ A 28 S3 EC
A Wireless LAN Security Protocol
Hardware Addressing and Frame Type Identification
How To Set Up A Wireless Network
Wireless LAN Security 4.3 Wireless LAN Security.
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Configure a Wireless Router
INTRODUCTION TO COMPUTER NETWORKS
Configure a Wireless Router
Presentation transcript:

Wireless Network Security Overview 無線網絡系統保安概覽

ASL experience in school projects Whole School Wireless Rollout Wireless Networking Project SAMS Project Web SAMS Project SIP MMLC Project ITED Project TSS

Why Wireless to improve the interactive learning mode in school to extend the learning process from one computer room into all classrooms and certain open areas

Wireless brings mobility. Examples are the following applications that can now be performed anywhere in a school. Used for Library -book reservation -check loan records -record renew Used for teaching -video sharing -file sharing Used for student assignment -information searching -knowledge sharing

Typical school IT environment

Wireless LAN Security Issues Issue  Hacker can view all information being broadcasted in a wireless network  Anyone in an Access Point coverage area can get on the wireless LAN

Wireless LAN Security Solutions 1/ Solution against the hacker Issue  Encrypt all data transmitted between client and Access Point  Without encryption key, user cannot transmit or receive data

Wireless LAN Security Solutions 2/ x Solution for the Authentication Issue

Key element of secured WLAN WPA’s technology 1) user authentication 802.1x + EAP 2) encryption TKIP 802.1x for dynamic key distribution MIC >>> WPA = 1) + 2)

Wired LAN Security Issues Issue  Virus attack  Intruder attack  Spam Solution  Anti-virus  IDS/IPS  Content Filter  Anti-spam

Sharing experience in school wireless rollout Convenience by Power over Ethernet When to use Roaming Why a/b/g Authentication and encryption setup

School Wireless Lan Implementation Work Flow Wireless Proposal a) Number of AP b) AP Location c) Quotation Accept by school? Site Survey No Yes Wireless Access Point Delivery Please get a whole school floor plan ready Implementation

School Wireless Lan Implementation Work Flow Finish Delivery Data Node Installation Access Point Hardware Installation Re-configuration User Acceptance Test? Wireless Software Configuration Pass

Thank You