Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing a Wireless Home Network BY: ARGA PRIBADI.

Similar presentations


Presentation on theme: "Securing a Wireless Home Network BY: ARGA PRIBADI."— Presentation transcript:

1 Securing a Wireless Home Network BY: ARGA PRIBADI

2 Wireless Facts  Signal Range  Approx 50 – 200 FT from access point unblocked  Security  Anyone can eavesdrop on an unsecured wireless network

3 What is LAN?  Stands for Local Area Network  Computer Network interconnected with other computers within a limited area  wide variety of LAN topologies have been used, including ring, bus, mesh and star, but the most common LAN topology in use today is switched Ethernet

4 Difference between wireless and wired LAN  LAN is much more faster and secure  Must physically be connected to switch or router to steal information  Up to 1Gbps transfer speed  WLAN is slower and much less secure  Vulnerable to attacks from outside  Limited to 54mbps

5 Sample of LAN

6 Sample of WLAN

7 WLAN  How it works  All components that can connect into a wireless medium in a network are referred to as stations. All stations are equipped with wireless network interface controllers  Wireless base station has to signal existence to allow devices to connect  Makes it vulnerable for attackers with strong transceivers

8 Types of attacks  Passive Attack: These attacks are not harmful to the networks; they take place for information-gathering. A malicious user just listens to the all inbound and outbound traffic of a wireless network.  Active Attack: As the attacker does a passive attack in order to get information about the wireless network, now she/he will do an active attack. Mostly, active attacks are IP spoofing & Denial of Service attack.  MITM Attack: Here the attacker accesses the information of the AccessPoint of any active SSID. Here dummy APs are created. The attacker listens the communication between to end points.

9 Consequences of Attacks  Things that could happen  Attack on laptops and workstations on the network  Steal internet access  Steal information transmitted over wireless network

10 Attack on Laptops and workstations  Attempt to steal data from hard drives  Damage data on hard drives  Planting malicious software to attack other computers  Attacks are traced to your computer not the attacker’s

11 Stealing internet access  Attacker joins your network, uses internet gateway  Things attacker could be doing while on your network  Downloading child porn  Torrent illegal files  Broadcast Spam  Attacks are traced to your network

12 How simple it is too attack WLAN  It is very simple  All you need is a laptop, wireless card, and some software  Directional antenna will boost the range from where you can access network  Directional antenna can be made from Pringles can

13 How do keep attackers out home WLAN  Change the service set identifier (SSID)  Change router password  Shutoff base station’s SSID broadcast  Enable (wireless protected access) WPA or WPA2 encryption

14 Changing SSID  To gain access to LAN you need SSID of router  Default SSID can be easily guessed such as (Linksys, Motorola)  Works best with previously stated security measures

15 Change Password  To access LAN you need router/base station password  Most default passwords are manufacturer’s name  Changing the password would drastically reduce chance of attacks

16 Close Your Network  Shutoff SSID broadcast  Reduces chance attacker sees your network  If you can’t see it you can’t steal it

17 Enable wireless encryption  Encrypt network traffic  Has to be done on base station and all access points, wireless adapters, etc.  All devices use the same WPA or WPA2 keys  Use WPA or WPA2 preferably WPA2  Wifi Alliance

18 Setting up wireless security  Make all security changes through a wired link  Changing settings wirelessly could encounter connection loss when applying changes  Set up devices in order:  Base station (cable/DSL/modem)  Access points  Test each device for connectivity before finalizing installation location

19 IBM network security  https://www.youtube.com/watch?v=RKvJyn8LCzc

20 Conclusion  Change default admin usernames and passwords  Change default SSID  Disable SSID Broadcast  Turn on WPA Encryption

21 References  https://www.consumer.ftc.gov/articles/0013-securing-your-wireless- network https://www.consumer.ftc.gov/articles/0013-securing-your-wireless- network  http://www.pcmag.com/article2/0,2817,2420002,00.asp http://www.pcmag.com/article2/0,2817,2420002,00.asp  http://compnetworking.about.com/od/wirelesssecurity/f/what-is- wpa2.htm http://compnetworking.about.com/od/wirelesssecurity/f/what-is- wpa2.htm  http://compnetworking.about.com/od/networkdesign/u/set-up- network-connections.htm


Download ppt "Securing a Wireless Home Network BY: ARGA PRIBADI."

Similar presentations


Ads by Google