The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

Securing Wireless Technology Another professional and intellectual presentation of Phillip Speagle.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Wireless Networks: Signaling and Security William Tucker CEN 4516: Computer Networks FGCU: Fort Myers, FL: 09/05.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
Chapter 9 Connecting to and Setting up a Network
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Introduction to Computer Networking. Wireless Network.
Technical Training: DAP-1360 Wireless N Access Point DAP-1360.
Securing a Wireless Network
Module 6.6 Networking. Internet Connectivity By default, new computers typically come with the network cards installed, the proper drivers installed,
Wireless Networking 102.
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Networking and Security
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Wireless Networks 2015 CTSP Course CTSP Clsss Wireless - February
Wireless Networks Tamus, Zoltán Ádám
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Understanding Wireless Networking. WiFi Technology WiFi began as a way to extend home and small office network access without installing more cable. As.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
PRESENTATION ON WI-FI TECHNOLOGY
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
David Abarca, Instructor Del Mar College Computer Corner Wireless Network Access Control.
Setting Wireless Network At Home By: Parveen Sharma.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Home Networks Taught by Gary Gabris. Home Networks What is a home network What good is having one - neat things you can do with one General network info.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
Securing your Personal Wireless Networks By: Bryan Oxendale.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Cyber Security: Today’s Threats and Mitigations Jonathan Homer, Cyber Security Analyst Idaho National Laboratory.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wi-Fi Presented By: N. Rakesh Kumar (07D01A0591).
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Wireless Network By Mohammed AL Amoudi. Overview Definition of Wireless Reliability Speed Security Conclusion.
Wireless Security By: Bryan M Keller.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
SUBMITTED BY DINEEJ A 28 S3 EC
How To Set Up A Wireless Network
Anatomy of a Wireless LAN – Part I
802.11b Wireless Network Security
Presentation transcript:

The Basics of HOME NETWORKS Capstone Technologies Group Brian Sammons

Why a home network?  Share an internet connection between multiple computers.  Share files and devices between computers  Better security by using a hardware firewall.

Choose Your Technology  a  b  g  n (coming)  Wired Network  Wireless Network

Wired vs. Wireless  Wired Network SecureSecure Cheaper equipmentCheaper equipment More reliableMore reliable Faster data transferFaster data transfer Run cable in walls or along baseboardsRun cable in walls or along baseboards May need a professionalMay need a professional Good for new constructionGood for new construction

Wired vs. Wireless  Wireless Network Mobility, Mobility, MobilityMobility, Mobility, Mobility Slower data speeds?Slower data speeds? More expensive?More expensive? Inherently insecureInherently insecure

a vs b  a Uses the less crowded 5Ghz spectrumUses the less crowded 5Ghz spectrum Accommodates more usersAccommodates more users Data speeds up to 54MbpsData speeds up to 54Mbps High absorption rate (easily blocked by walls and objects)High absorption rate (easily blocked by walls and objects) Operating range 150ftOperating range 150ft Not compatible with b protocolNot compatible with b protocol Components are expensiveComponents are expensive

a vs b  b Uses the overcrowded 2.4 GHz spectrumUses the overcrowded 2.4 GHz spectrum Data speeds up to 11 Mbps (biggest disadvantage)Data speeds up to 11 Mbps (biggest disadvantage) 300ft operating range300ft operating range Low absorption rate (travels through walls and objects)Low absorption rate (travels through walls and objects)

g  g Compatible with both a and b networksCompatible with both a and b networks Uses the overcrowded 2.4 GHz spectrum.Uses the overcrowded 2.4 GHz spectrum. Data speeds up to 54 MbpsData speeds up to 54 Mbps 300ft operating range300ft operating range Low absorption rate (travels through walls and objects)Low absorption rate (travels through walls and objects)

n  Approximately 1 year away (2005-6)  Frequency most likely the 5GHz range, meaning possible compatibility with a  Throughput to match highest possible data rates- (raise the effective throughput of WLANs to at least 100M bps)  Defining standardized modifications to the physical layers and MAC layers, which will improve not just data rates but also actual data throughput

Network Set up Demo  Linksys  Belkin  DLink  Microsoft

Securing my wireless network  Change the defaults!  Enable WEP  MAC Address filtering  Disable DHCP  Change the IP Subnet

Change the defaults!  Change the default SSID (Service Set IDentifier)(Service Set IDentifier)  Disable SSID Broadcast  Change the default username and password  Default password lists commonly available, just Google “default password list” 

Enable WEP  Wired Equivalent Privacy (WEP) is a protocol used for encrypting packets on a wireless network. It uses a 64-bit (or 256- bit, depending on the vendor) shared key algorithm. Using WEP will increase the protection on your data, but doing so will reduce the effective data rates.  Truly secure? Nope!

MAC Address Filtering   Only MAC addresses that have been registered with the wireless access point are able to gain access to your network.   You can usually locate the MAC address of your network card on the device itself.

Disable DHCP  Use static IP addresses if the number of users on the network is small. Turning off DHCP will prevent wireless sniffers from seeing the IP addresses being used.

Change the IP Subnet  Most wireless routers use the default or network. It is easy for people to guess the IP addresses used and illegally gain access to the network.

OK, I’ve done all that…  What’s next?  How secure am I now?

Wardriving / Warchalking  html html html  What’s needed?  Who’s doing it?  Am I at risk?

Hotspots in the area  Lots of unsecured homes/businesses  

Conclusion  Thank you for your time! Capstone Technologies Group Brian Sammons