Download presentation
Presentation is loading. Please wait.
Published byAlvin Richardson Modified over 8 years ago
1
Securing your Personal Wireless Networks By: Bryan Oxendale
2
Topics Overview of wireless networks Types of wireless encryption Top 5 things to do to secure your wireless network. Advanced ways of controlling users in accessing network resources My case study
3
Overview of Wireless networks
4
Wireless Networks Advantages of a Wireless Network. Easy to install Easy to configure Very convenient Cost efficient Disadvantages of Wireless networks Security Speed Interference People that don’t know how to protect themselves especially in a college town leave their networks open for anyone to get on, take up bandwidth, use network resources, and even lock you out of the network
5
Types of Wireless Encryption
6
Wireless Encryption Methods WEP A.K.A. Wired Equivalency Protocol Provides encryption so that the casual attacker just sees encrypted words Included in mostly all wireless devices, so there is no external costs WPA A.K.A. Wi-Fi Protected Access More elaborate encryption methods Doesn’t use a static encryption key like WEP. Also included in newer wireless devices
7
802.11i AKA WPA2 because it is based off of the WPA standard. Advanced encryption methods AES (Advanced Encryption Standard) Designed for the US government but has become a commercial standard. Can use up to 256 bit encryption key to secure data. More secure encryption keys TKIP (Temporal Key Integrity Protocol) This is an Encryption Protocol that uses Dynamic encryption keys for each packet transmitted
8
Top 5 things to do when you first get a wireless router.
9
Top 5 things to do when you first get a wireless network 1. Change the default router password 2. Disable SSID broadcast 3. Change SSID 4. Enable WPA2 encryption 5. Enable MAC address filtering
10
Changing Default Password First thing that you should do Change the password so that it is secure but so that you can remember it Reasons to change the password: So wardrivers cannot get onto you router So people on your network can’t get on an disable settings.
12
Disabling SSID broadcast. SSID stands for Service Set Identifier SSID broadcast is the broadcast of your wireless network name. This SSID name is unique to your network Reasoning to disable this broadcast Prevents any novice attacker from walking down the street and doing a network scan and discovering your wireless network’s SSID.
13
Changing your SSID Change your SSID to something unique to you or your network. Anyone that has a little bit of knowledge knows that most of the default SSIDs are manufacturer’s names such as linksys, netgear, dlink, etc… You want to make sure that you change the SSID often.
15
Enabling WPA2 Chose to enable 802.11i a.k.a. WPA 2 because it is the best and most secure method of encryption available to consumers today. If one of your user’s computer does not support WPA 2 you can still use WPA 2 because it is backwards compatible with WPA
17
Enabling MAC filtering The purpose of MAC filtering is so that you can configure users to be allowed or denied access to the network. MAC filtering looks at the physically burned in address of your Network Interface Card (NIC) Called the MAC address short for Media Access Control Address. If that address matches the address on the MAC address list then it will either permit you access or deny you access depending on what your settings are on your router.
20
Advanced ways of controlling internet access
21
Advanced ways of Controlling Network clients: Internet Access Internet Limitations This option is located in the Access restriction tab under internet access. Lets you designate what times a day and week you are going to let users access the internet. Comes in useful when you have young children or annoying roommates
23
Advanced ways of Controlling Network clients: Parental Control Parental Controls This option is located in the Access restriction tab under Parental Control. This option lets you customize levels of control for each member of your family. You can pick from 16 categories of access Can give you detailed reports of what site you members are trying to access Can also set up Email filters and Instant message filters to chose who your children are talking to.
24
My Case Study Study of wireless networks in the Indiana Area
25
Case Study What I did as a case study is I drove a 2.7 mile loop around Indiana. I picked 9 locations and did a wireless network search. I counted the total number of wireless networks and then I counted the total number of unprotected networks. The purpose of this was to see how many people out there protect their wireless network.
26
Location: Duquesne Beer Dist. Unsecured/ Secure Wireless networks: 6/12 Location: S. 13 th and Washington St. Unsecured/ Secure Wireless networks: 3/17 Location: S. 13 th and Philadelphia St. Unsecured/ Secure Wireless networks: 9/17 Location: S. 10 th and Philadelphia St. Unsecured/ Secure Wireless networks: 9/21 Location: S. 6 th and Wayne. Unsecured/ Secure Wireless networks: 10/23 Location: Eberly College of Business Unsecured/ Secure Wireless networks: 13/19 Location: Wayne Ave. and Maple St. Unsecured/ Secure Wireless networks: 10/23 Location: S. 7 th and Wayne. Unsecured/ Secure Wireless networks: 5/13 Location: S. 6 th and Philadelphia St. Unsecured/ Secure Wireless networks: 10/22 Total Mileage: 2.7 Miles
27
Case Study Results S. 13 th and Philly9/17=53% unprotected S. 10 th and Philly9/21=43% unprotected S. 6 th and Philly10/22=46% unprotected S. 6 th and Wayne10/23=44% unprotected S. 7 th and Wayne5/13=39% unprotected Wayne and Maple10/23=44% unprotected ECOB13/19=69% unprotected Duquesne Beer 6/12=50% unprotected S. 13th and Wash.3/17=18% unprotected
28
Totals Max Eberly College of Business (69% unprotected) Min S. 13 th and Washington St. (18% unprotected) Mean Total 75/167 = 45% unprotected
29
Conclusion to Case Study An average of 45% of the networks around this area are unprotected. At least this is below 50% but still this number should be 0% So the more we can talk to people and inform them of how to protect their network the better off everyone will be.
30
Reference Page Linksys Wireless G Router with Speedbooster. 4 Oct. 2006. Path: support; downloads; WRT54GS V2.0; downloads for the product; User Manual. Tomsho, Greg, Ed Tittel, and David Johnson. Guide to Networking Essentials. Ed. Will Pitkin, III, et al. 5th ed. N.p.: Thomson Course Technology, n.d.
31
The End
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.