Download presentation
Presentation is loading. Please wait.
Published byZoe Edwards Modified over 9 years ago
2
Wireless Security Tabatha Lakkala
3
Outline 2 Wireless Access Points Define Wireless Access Points Hidden and not so hidden dangers How to protect yourself and information Bluetooth and Cellphones Define Bluetooth Hidden dangers How to protect yourself and information Phone Usage What is the bottom line?
4
Wireless Access Points 3 Wireless devices connecting to wired network Connections in the home Connections in the office Wireless hotspots almost everywhere
5
Dangers 4 War Driving War Chalking Rogue Access Points (Evil Twin)
6
Network Protection 5 Secure your router/access point Types of antenna and location No broadcasting MAC filtering Enable encryption
7
Bluetooth & Cellphones 6 Wireless communication for small devices
8
Bluetooth Dangers 7 Bluejacking Bluesnarfing
9
Cellphone Protection 8 Know your security modes Disable the Bluetooth
10
Phone Usage 9
11
What is the bottom line? 10 Security threats are rising Let’s protect our information Know your enemy and arm yourself
12
Summary 11 Wireless Access Points Define Wireless Access Points Hidden and not so hidden dangers How to protect yourself and information Bluetooth and Cellphones Define Bluetooth Hidden dangers How to protect yourself and information Phone Usage What is the bottom line?
13
Questions Samuelle, T.J. (2011). Mike Meyers’ Certification Passport: CompTIA Security+. New York: McGraw Hill Company. 12
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.