CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts.

Slides:



Advertisements
Similar presentations
DSL-2730B, DSL-2740B, DSL-2750B.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Man in the Middle Paul Box Beatrice Wilds Will Lefevers.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Wi-Fi Structures.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
DVG-N5402SP.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Configuring Linksys Wireless Router Prof. Valencia Community College.
Wireless Network Security Lab Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Configuring Linksys Wireless Ethernet Bridge Prof. Valencia Community College.
Welcome to Networking! 1. Connect your computer to the network with a cable 2. Copy the Networking folder from the flash drive to the computer or your.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Securing a Wireless Network
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
CTSP TRAINING Router 101 And Networking Basics. You Don’t Need Internet Access to Run or Connect your devices to an Ethernet switch or Router Enable DHCP.
Common Devices Used In Computer Networks
Wireless Networks Tamus, Zoltán Ádám
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
EDT 661 Kelly Maurer. (((DS))) (((WIRELESS PRINTER))) ((( NETBOOK ))) DESKTOP ROUTER MODEM INTERNET /DLS (FROM WALL)
Environment => Office, Campus, Home  Impact How, not Whether A Checklist for Wireless Access Points.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless Networks and the NetSentron By: Darren Critchley.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Wireless Networking & Security Greg Stabler Spencer Smith.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Wireless networking Unit objective: Identify wireless networking standards, and install a SOHO network.
Setting Wireless Network At Home By: Parveen Sharma.
DHP Agenda: How to Access Web Interface of the DHP-1320 on Access Point Mode How to Access Web Interface of the DHP-1320 on Router Mode How to Change.
CTC228 Nov Rest of the Semester...  Next time (Mon 23 Nov) – Go over test, prep lightning talks  Then (Wed Nov 25) – Class canceled (so you.
Solving the Security Risks of WLAN Tuukka Karvonen
ITIS 3110 LAB 10 Wireless. configure Pi to use a Wi-Fi dongle New lab Extremely simple.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
SOHO Security Recommendations. Change default user/password Of the AP/router Typical  admin – admin  root – root  root – 1234  Admin - There are web.
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
How To Set Up A Wireless Network
1. Press the Power button or switch to flip on the printer, if it is turn off. 2. From the Home display screen on the product control panel, click the.
Installing the HP LaserJet Pro 500 color MFP M570 printer software in Windows on a Wireless Network & Wired Network.
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

CS591-Fall 10 Clonts 1 Wireless Network Security Michael Clonts

2 Agenda Will discuss: – Home wireless configuration – Public hotspot security Will not discuss: – Nuts and bolts of wireless security

3 Home Wireless You’ve bought a wireless router… now what?

4 Home Wireless – Basic Security Change administrator user/password Enable encryption – Use WPA2 if supported Change default SSID (your network “name”)

5 Home Wireless – Advanced Security Disable SSID broadcast Enable MAC address filtering Enable static IP addresses, not DHCP Position router to minimize signal broadcast outside of building

6 Home Wireless – Periodic Actions Review router logs Change passphrase used to generate keys

7 Home Wireless – Periodic Actions Check for firmware upgrades Disable during periods of non-use

8 Public Wireless Hotspots You’re at studying at Starbucks… how can you safely use their WiFi?

9 Public Wireless – Basic Security Enable local firewall Verify SSID name with establishment Disable “auto-connect to open network” feature Disable file sharing

10 Public Wireless – Encryption Options Use higher-layer encryption methods: – HTTPS for web data – SSH for console connections – SFTP for file transfers – VPN into a secure network Don’t sent sensitive data without these!

Questions? Any questions? CS591-Fall 05 Sonchar and Reese 11