Download presentation
Presentation is loading. Please wait.
1
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI
2
Questions How many of you have more than one computer at home? How do you connect to the Internet (DSL, cable, dialup)? How many already have a home router? Already have a wireless router?
3
Agenda What is a Home network Connecting things together Firewalls and Filtering Setting up a home router Setting up Print and File Sharing Questions
4
Home Network One or more computers connected: To the Internet with a router To the Internet with a router To each other in order to share Resources: To each other in order to share Resources: Internet Connections Sharing Files Sharing Printers
5
What is a Router Connects one network to another Sometimes called a “Gateway” In our case it connects to your cable modem or DSL Line Routers keep track of IP addresses and physical (MAC) addresses of hosts Managed (As we shall see)
6
What is a Cable/DSL Modem Usually provided and controlled by your ISP Connects your home to the Internet. This is the device that gets your public IP address Normally has no firewall protection Make sure you use the right cable
7
What is a Firewall A device the filters packets or traffic Its job is to be a traffic cop You configure the firewall: What will allow to pass What will allow to pass What will it block What will it block Hides your home network from the outside world Can be either in hardware or software
8
Firewall Protection 1.Implement a firewall (checks incoming traffic at the network before it gets to your home network) Default – Blocks all Incoming connections 2.Leaving you home network default is allow all outbound connections 3.Hardware firewalls protect you home network by stop all traffic before it get to your computers 4.Personal software firewall on your computer blocks incoming and outgoing (lets you know what is leaving your computer) Firewall Home Network Internet
9
Firewall Routers The idea is layers of protection Examples of home combo units include Dlink Dlink Dlink Netgear Netgear Netgear Linksys Linksys Linksys
10
Software Firewalls Add additional protection by: Controlling what leaves your computer Controlling what leaves your computer Adding a second level of protection Adding a second level of protection By being aware of application level attacks By being aware of application level attacks By allow you to schedule By allow you to schedule Usage of the internet by time (control access at night) By location (block content for young children)
11
Software Firewalls for Home Use McAfee Firewall McAfee Firewall Symantec’s Norton Personal Firewall Symantec’s Norton Personal Firewall Zone AlarmZone Alarm (Free) Zone Alarm Computer Associates with Firewall (free) Computer Associates with Firewall (free) Windows Firewall in XP Service Pack 2 (free)
12
Wireless What is wireless Wireless Networking Standards 802.11 a, b, and g 802.11 a, b, and g Recommend a standard “g” model Recommend a standard “g” model Wireless Security Standards Recommend Wired Equivalent Privacy (WEP) Recommend Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Wi-Fi Protected Access (WPA)
13
Wireless Network Standards StandardDescription 802.11 ●A group of specifications for WLANs developed by IEEE ●Defines the physical and MAC portion of the data link layer 802.11a ●Transmission speeds up to 54 megabits per second (Mbps) ●Works well in densely populated areas 802.11b ●11 Mbps ●Good range but susceptible to radio signal interference 802.11g ●Enhancement to and compatible with 802.11b ●54 Mbps, but at shorter ranges than 802.11b 802.1x ●Authenticates clients before it lets them on the network ●Requires greater hardware and infrastructure investment
14
Lesson: Introduction to Securing Wireless Networks What are the benefits of wireless networks? Common threats to wireless security Wireless network standards Guidelines for using security to mitigate risks to wireless networks Wireless network architecture
15
What Are the Benefits of Wireless Networks? ● Mobile users moving between offices save time and effort with a transparent connection to the corporate network ● Users can use e-mail, electronic calendars, and chat technologies when away from their desks ● The cost of provisioning network access to buildings is substantially lowered ● The network can be easily scaled to respond to different levels of demand when the organization changes Operational benefits: Business benefits:
16
Common Threats to Wireless Security ● Eavesdropping ● Spoofing ● Interception and modification of transmitted data ● Freeloading ● Denial of service ● Rogue WLANs ● Eavesdropping ● Spoofing ● Interception and modification of transmitted data ● Freeloading ● Denial of service ● Rogue WLANs
17
Guidelines for Using Security to Mitigate Risks to Wireless Networks Specify the use of software scanning tools to locate and shut down rogue WLANs on your corporate network If you allow unauthenticated access to your wireless network, require a VPN connection to access the corporate network Require data encryption for all wireless communications Require 802.1x authentication to help prevent spoofing, freeloading, and accidental threats to your network
18
Wireless Network Architecture BSS DS ESS IBSS STA AP
19
Demo: Wireless Devices Clearsight Scanner
20
Demo: How to configure Wireless Firewall/router Example: Basic Settings Basic Settings Wireless Settings Wireless Settings Backup Settings Backup Settings Set Account name and password Set Account name and password Blocking and Filtering Blocking and Filtering
21
Steps to protect your wireless network 1.Change the default password on your router 2. Enable WEP on router and wireless workstation 3.Use MAC address filtering 4.SSID broadcast of 5.Prohibit Peer-to-peer (Ad Hoc) networking 5. Keep current on hardware bios upgrades
22
Demo: Rogue Wireless Devices AirSnare
23
Weak Passwords Your computer password is the foundation of your computer security No Password = No Security No Password = No Security Old Passwords & Same Password = Little Security Change the “administrator” password on your computer
24
Questions WWW.MIR.NET FOR COPIES OF THIS DECK
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.