Download presentation
Presentation is loading. Please wait.
1
Improving Security
2
Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A very powerful PC
3
IP address One IP address for one computer e.g. 202.40.197.69
4
People Hacker Cracker
5
Tricks Social Engineering –Phishing –E-mail Trash
6
Making Router safer Traditional Wireless
7
Turn on Encryption WEP (Wired Equivalent Privacy) –Used in many routers –Weakness in the implementation (25GB of data to crack) –Still worthwhile to deploy WPA (Wireless Protected Access) –Safer than WEP
8
SSID Service Set Identifier Needed for communication default name for each manufacturer Measures –Change the default name –Stop broadcasting
9
Admin Account Default name and password Measures: –Change account name and password
10
DHCP Dynamic Host Configuration Protocol Assign IP address to each PC Measures: –Disable DHCP –Assign IP addresses manually –Enable IP filtering (if available)
11
MAC (Media Access Control) Unique MAC address for each LAN card Measures: –Accept computers with approved MAC addresses only
12
Other measures (for advanced users) Setting minimum connection speed Adjust power of radio signal
13
Wardriving Driving around to detect access points Facilities needed: –Notebook PC with wireless LAN card –A high gain antenna (optional) –Wardriving software
14
Encryption Cipher –Encrypt data Plaintext Ciphertext Encryption key
15
Public key cryptography Asymmetric key cryptography Consists of –One public key –One private key
16
Hybrid system One key system Public key system
17
Digital signatures A message has not been modified
18
Digital certificate Prove the identity of a sender Issued by certificate authority (CA)
19
Method to identify Challenge response
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.