Download presentation
Presentation is loading. Please wait.
Published byAnastasia Golden Modified over 9 years ago
1
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE
2
OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless Networks (Tips) Conclusion
3
HISTORY The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson. The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines. And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world.
4
W HAT IS A WIRELESS NETWORK ? Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices.
5
P ROS & CONS OF WIRELESS NETWORKING Pros Mobility Elimination of unsightly wires Thus, convenient and easy to use Cons Potential for radio interference due to weather, other wireless devices, or obstructions like walls. Susceptible to security violations Requires more user knowledge
6
W IRELESS N ETWORK S ECURITY M ETHODS Wired Equivalent Privacy (WEP) Older method, still available to support older devices No longer recommended The network security key used encrypts the information that one computer sends to another computer across your network However, WEP security is relatively easy to crack
7
W IRELESS N ETWORK S ECURITY M ETHODS ( CONTD.) Wi-Fi Protected Access (WPA) Besides encrypting information, makes sure that the network security key has not been modified. Authenticates users to help ensure that only authorized people can access the network Version: WPA: Initial WPA version, to supply enhanced security over the older WEP protocol WPA2: Successor of WPA, and replaces TKIP encryption protocol with CCMP to provide additional security Target Users (authentication key distribution) WPA-Personal: designed for home and small office networks and doesn’t require an authentication server WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server
8
W IRELESS N ETWORK S ECURITY M ETHODS ( CONTD.) 802.1X authentication Can help enhance security for 802.11 wireless networks and wired networks Uses an authentication server to validate users and provide network access On wireless networks, 802.11X can work with WEP or WPA keys Typically used when connecting to a workplace network
9
W HY DOES IT MATTER ? Unencrypted networks can expose your system to hackers and they can have access to: Websites you visit Emails you send and receive Files you send over the network FTP logins and files Instant Messaging Communication
10
S ECURING WIRELESS NETWORKS Change Default Administrator Passwords(and Usernames) Use a strong password Change the default SSID and disable its broadcast Use good wireless encryption Upgrade your network adaptor top one that works with WPA or WPA2 Use another layer of encryption when possible(like SSH)
11
S ECURING WIRELESS NETWORKS ( CONTD.) Enable MAC address filtering Do not auto-connect to open Wi-Fi Networks Assign Static IP Addresses to Devices Enable Firewalls On Each Computer and the Router Position the Router or Access Point Safely Turn Off the Network During Extended Periods of Non-Use
12
C ONCLUSION Risks are inherent in any wireless technology, but is still better than the wired technology Security is most important, so use the best protection WPA2 with AES is currently the most secure encryption method Enable any additional security measures to secure your wireless network
13
REFERENCES http://compnetworking.about.com/cs/wireless/f/wh atiswireless.htm http://en.wikipedia.org/wiki/Wireless_security http://en.wikipedia.org/wiki/Wireless_LAN_securi ty#Security_options http://en.wikipedia.org/wiki/Wi- Fi_Protected_Access http://windows.microsoft.com/en-US/windows- vista/What-are-the-different-wireless-network- security-methods http://www.computer- encryption.com/2009/05/what-wifi-hackers-can- see-580.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.