SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.

Slides:



Advertisements
Similar presentations
Presented by: Carl Skeene. OUTLINE Motivation Introduction Problem statement Assumption Proposed solution Results Conclusion Future work References Acknowledgements.
Advertisements

Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
“An integrator view on storage consolidation & Information Lifecycle Management (ILM)” Ulrik Van Schepdael - Marketing Manager Belgacom Network & System.
H OME M ONITORING U SING W IRELESS IP C AMERA Dan
SIR Area 2 Computers & Technology Dean Steichen March 2012.
Unmanned Surveillance Tank Frederick Guilfoil Eastern Kentucky University Dept. of Technology, CEN 499.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
SG-VoIP Page 1 / 14 PLANET Pan / Tilt Internet Camera Internet Surveillance Solution.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
DIR-657 HD Media Router 1000 Sales Guide Wireless & Router Product Div. Feb 2011 D-Link WRPD.
Stephen Riddle (EKU, Dept. of Technology, NET program) Presented by: Stephen Riddle.
SKY-PEak: BRIDGING SKYPE Jamie Caudill Eastern Kentucky University.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
FRONT DOOR MONITOR Tremayne L. Perkins EKU Dept of Technology, CEN/CET.
DCS-5230 Wireless N PTZ Network Camera Sales guide D-Link Confidential.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
By Justin Addison Network Security & Electronics Program Dept. of Applied Engineering & Technology, EKU.
An Overview of Using Computers
RFID P ET F EEDER Sally Smith Eastern Kentucky University Department of Technology NET program.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Networked Storage Montelle Kline. 2. © NETGEAR ®. All rights reserved »Fail-Safe Back up your most valuable files automatically with mirroring.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
SET UP A SOHO SERVER AND NETWORK: THE BASICS Tony Hancock (NET 2012 Capstone. EKU) Presented by: Tony Hancock.
DIR-827 HD Media Router 2000 Sales Guide Wireless & Router Product Div. May 2011 D-Link WRPD.
PHP MYWIKI Brian Casey Eastern Kentucky University.
StorCenter ix2 Training By Erik Collett
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
ATTIC BOULDERING IN ACTION Brandon Powell EKU Technology department EET 499 CET/CEN Capstone project 2009.
CIS CORPORATION CORBIN, KY SUMMER 2007 WALTER WAHLSTEDT CIS Internship.
Risk Management. What we offer? We provide IP video monitoring solutions for safety and security through our systems integration capabilities.
Your Database Solution Jason King. Benefits of a Database Centralized information Searchable Save space from multiple orders from one client.
Copyright 2014 Intel Corporation. All rights reserved. Taking Advantage of Digital Security & Surveillance January 2014.
Click to edit Master title style Ramsey Baker Kunal Parbadia Radford Parker Rohit Sahay David Salazar SecurityCam Single Modular Wi-Fi Enabled Security.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Chapter 2 Securing Network Server and User Workstations.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Brian Hixenbaugh Network Managment. My Home Network.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
SOLARPACKING Mitch Vernon Eastern Kentucky University.
LINUX CLUSTERING USING OPENMOSIX Jose Matthews Computer Electronic Networking, EKU College of Business and Technology.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
CabSec Integrated Security ANTHONY WARNER NETWORK SECURITY & ELECTRONICS PROGRAM OF AE&T AT EASTERN KENTUCKY UNIVERSITY.
 Full scale audit of all their current network environment  Examination of the current security policy and physical security  Full scale audits will.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
HOME SCHOOL FOR NETWORK SECURITY James Coffey Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Amcrest security systems are part of a generation of advanced high quality remote monitoring and video security systems which are bridging the gap between.
HIGH END DESKTOP WITHOUT HIGH END PRICE VIRGIL EDWARDS NET 499 SPRING 2016 EASTERN KENTUCKY UNIVERSITY 1.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
LEARNBOT Matthew Williams Network Security and Electronics Program Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Types of computers Module 1.10 AS identifies and distinguishes between computer types and associated software. AS identifies the main hardware.
Various Features and Services Provided By the SpotCam.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
Nexbase Invites You To Our Special Products
GPS Pi By: Justin Miracle.
Configure Instruction
Networking & Wireless Routers II Driver Installation
The Claw Alert Feline Training Assistant
Cat Litter Box Ventilation System
USING A RASPBERRY PI AS A WATER DETECTION SYSTEM
ICT meeting Business needs
Cross-Selling Solutions
Home Security in the Age of Broadband
Presentation transcript:

SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone

2 OUTLINE Motivation Introduction Problem Statement Assumptions Proposed Solutions Results Conclusions Future Work References Acknowledgements

3 MOTIVATION Affordable home and home network security Home surveillance systems can cost hundreds, even thousands of dollars Raspberry Pi experience Experience implementing firewall software Providing secure and accessible network storage

4 INTRODUCTION We all desire security It is important that we take all steps necessary to protect our digital data from falling into the wrong hands Storing digital data can be a tedious process

5 PROBLEM STATEMENT To provide affordable home video monitoring with remote viewing capability Enhance home network security To provide a secure storage area for local data backups and camera footage

6 ASSUMPTIONS The user has an active internet connection The user has some knowledge regarding computer networking The user has a home PC The user has a spare PC to act as a firewall

7 PROPOSED SOLUTION A dedicated firewall PC running the Untangle Firewall software will secure the home network from unwanted intrusion. A NAS device will be attached to the home router to provide secure and accessible data storage. A Raspberry Pi will act as a motion activated surveillance camera. A live stream of the camera will be made available via a URL.

8

9 RESULTS The Untangle Firewall software effectively protects the home network from unwanted intrusion. The NAS device successfully provides 2TB of network storage space for personal files and video footage. The Raspberry Pi surveillance camera successfully captured 25 seconds of video footage and stored it on the NAS device

RESULTS I had to replace my home router due to a firmware issue preventing the use of a NAS device. The Raspberry Pi camera module stopped working. Was not able to get the live stream via URL to work 10

11

12

13

14

Source: &feature=youtube_gdata Securing Your Home and Home Network

16 CONCLUSIONS The project was a success! Proper time management allowed me to complete the project within the allotted timeframe Although a project of this scale was intimidating, I had a blast! I plan to continue using this system in my own home

17 FUTURE WORK Making the live stream via URL available Adding more cameras for enhanced video surveillance capabilities Set up alerts when the Raspberry Pi detects motion and starts filming Adding Dropbox storage capabilities

REFERENCES Netgear. (2012). USB Storage. In R6300 wifi router ac dual band gigabit: User manual (pp ). San Jose, CA: Netgear, Inc. Scavix Software Ltd. & Co. (2014). Raspberry Pi as low-cost HD surveillance camera. Retrieved from surveillance-camera/#statsModal surveillance-camera/#statsModal Untangle. (n.d.). Network configuration. Retrieved March 1, 2015, from Vilros. (2014). Vilros: Raspberry Pi user's guide. Author. 18

ACKNOWLEDGEMENTS I would like to thank Dr. Vigs for always being available and willing to help. I would like to thank Dr. Kilgore for lending hardware needed to complete the project I would like to thank all of my class mates. You guys are awesome! I would like to thank Allison Smith for all of her support. I would like to thank Scavix Software for the awesome instructable. 19