Download presentation
Presentation is loading. Please wait.
1
Securing a Wireless Home Network BY: ARGA PRIBADI
2
Wireless Facts Signal Range Approx 50 – 200 FT from access point unblocked Security Anyone can eavesdrop on an unsecured wireless network
3
What is LAN? Stands for Local Area Network Computer Network interconnected with other computers within a limited area wide variety of LAN topologies have been used, including ring, bus, mesh and star, but the most common LAN topology in use today is switched Ethernet
4
Difference between wireless and wired LAN LAN is much more faster and secure Must physically be connected to switch or router to steal information Up to 1Gbps transfer speed WLAN is slower and much less secure Vulnerable to attacks from outside Limited to 54mbps
5
Sample of LAN
6
Sample of WLAN
7
WLAN How it works All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers Wireless base station has to signal existence to allow devices to connect Makes it vulnerable for attackers with strong transceivers
8
Types of attacks Passive Attack: These attacks are not harmful to the networks; they take place for information-gathering. A malicious user just listens to the all inbound and outbound traffic of a wireless network. Active Attack: As the attacker does a passive attack in order to get information about the wireless network, now she/he will do an active attack. Mostly, active attacks are IP spoofing & Denial of Service attack. MITM Attack: Here the attacker accesses the information of the AccessPoint of any active SSID. Here dummy APs are created. The attacker listens the communication between to end points.
9
Consequences of Attacks Things that could happen Attack on laptops and workstations on the network Steal internet access Steal information transmitted over wireless network
10
Attack on Laptops and workstations Attempt to steal data from hard drives Damage data on hard drives Planting malicious software to attack other computers Attacks are traced to your computer not the attacker’s
11
Stealing internet access Attacker joins your network, uses internet gateway Things attacker could be doing while on your network Downloading child porn Torrent illegal files Broadcast Spam Attacks are traced to your network
12
How simple it is too attack WLAN It is very simple All you need is a laptop, wireless card, and some software Directional antenna will boost the range from where you can access network Directional antenna can be made from Pringles can
13
How do keep attackers out home WLAN Change the service set identifier (SSID) Change router password Shutoff base station’s SSID broadcast Enable (wireless protected access) WPA or WPA2 encryption
14
Changing SSID To gain access to LAN you need SSID of router Default SSID can be easily guessed such as (Linksys, Motorola) Works best with previously stated security measures
15
Change Password To access LAN you need router/base station password Most default passwords are manufacturer’s name Changing the password would drastically reduce chance of attacks
16
Close Your Network Shutoff SSID broadcast Reduces chance attacker sees your network If you can’t see it you can’t steal it
17
Enable wireless encryption Encrypt network traffic Has to be done on base station and all access points, wireless adapters, etc. All devices use the same WPA or WPA2 keys Use WPA or WPA2 preferably WPA2 Wifi Alliance
18
Setting up wireless security Make all security changes through a wired link Changing settings wirelessly could encounter connection loss when applying changes Set up devices in order: Base station (cable/DSL/modem) Access points Test each device for connectivity before finalizing installation location
19
IBM network security https://www.youtube.com/watch?v=RKvJyn8LCzc
20
Conclusion Change default admin usernames and passwords Change default SSID Disable SSID Broadcast Turn on WPA Encryption
21
References https://www.consumer.ftc.gov/articles/0013-securing-your-wireless- network https://www.consumer.ftc.gov/articles/0013-securing-your-wireless- network http://www.pcmag.com/article2/0,2817,2420002,00.asp http://www.pcmag.com/article2/0,2817,2420002,00.asp http://compnetworking.about.com/od/wirelesssecurity/f/what-is- wpa2.htm http://compnetworking.about.com/od/wirelesssecurity/f/what-is- wpa2.htm http://compnetworking.about.com/od/networkdesign/u/set-up- network-connections.htm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.