wireless security ashima sood peyton greene. overview history introduction to wireless networking...

13
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE

Upload: anastasia-golden

Post on 24-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WIRELESS SECURITY

ASHIMA SOOD

PEYTON GREENE

Page 2: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

OVERVIEW

History

Introduction to Wireless Networking

Wireless Network Security Methods

Securing Wireless Networks (Tips)

Conclusion

Page 3: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

HISTORY

The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson.

The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines.

And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world.

Page 4: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WHAT IS A WIRELESS NETWORK?

Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices.

Page 5: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

PROS & CONS OF WIRELESS NETWORKING

Pros Mobility Elimination of unsightly wires Thus, convenient and easy to use

Cons Potential for radio interference due to weather,

other wireless devices, or obstructions like walls. Susceptible to security violations Requires more user knowledge

Page 6: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WIRELESS NETWORK SECURITY METHODS

Wired Equivalent Privacy (WEP) Older method, still available to support older

devices No longer recommended The network security key used encrypts the

information that one computer sends to another computer across your network

However, WEP security is relatively easy to crack

Page 7: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WIRELESS NETWORK SECURITY METHODS (CONTD.) Wi-Fi Protected Access (WPA)

Besides encrypting information, makes sure that the network security key has not been modified.

Authenticates users to help ensure that only authorized people can access the network

Version: WPA: Initial WPA version, to supply enhanced security

over the older WEP protocol WPA2: Successor of WPA, and replaces TKIP encryption

protocol with CCMP to provide additional security Target Users (authentication key distribution)

WPA-Personal: designed for home and small office networks and doesn’t require an authentication server

WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server

Page 8: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WIRELESS NETWORK SECURITY METHODS (CONTD.) 802.1X authentication

Can help enhance security for 802.11 wireless networks and wired networks

Uses an authentication server to validate users and provide network access

On wireless networks, 802.11X can work with WEP or WPA keys

Typically used when connecting to a workplace network

Page 9: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

WHY DOES IT MATTER?

Unencrypted networks can expose your system to hackers and they can have access to: Websites you visit Emails you send and receive Files you send over the network FTP logins and files Instant Messaging Communication

Page 10: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

SECURING WIRELESS NETWORKS

Change Default Administrator Passwords(and Usernames)

Use a strong password Change the default SSID and disable its

broadcast Use good wireless encryption Upgrade your network adaptor top one that

works with WPA or WPA2 Use another layer of encryption when

possible(like SSH)

Page 11: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

SECURING WIRELESS NETWORKS (CONTD.)

Enable MAC address filtering Do not auto-connect to open Wi-Fi Networks Assign Static IP Addresses to Devices Enable Firewalls On Each Computer and the

Router  Position the Router or Access Point Safely Turn Off the Network During Extended

Periods of Non-Use

Page 12: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless

CONCLUSION

Risks are inherent in any wireless technology, but is still better than the wired technology

Security is most important, so use the best protection

WPA2 with AES is currently the most secure encryption method

Enable any additional security measures to secure your wireless network