wireless security ashima sood peyton greene. overview history introduction to wireless networking...
TRANSCRIPT
![Page 1: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/1.jpg)
WIRELESS SECURITY
ASHIMA SOOD
PEYTON GREENE
![Page 2: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/2.jpg)
OVERVIEW
History
Introduction to Wireless Networking
Wireless Network Security Methods
Securing Wireless Networks (Tips)
Conclusion
![Page 3: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/3.jpg)
HISTORY
The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson.
The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines.
And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world.
![Page 4: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/4.jpg)
WHAT IS A WIRELESS NETWORK?
Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices.
![Page 5: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/5.jpg)
PROS & CONS OF WIRELESS NETWORKING
Pros Mobility Elimination of unsightly wires Thus, convenient and easy to use
Cons Potential for radio interference due to weather,
other wireless devices, or obstructions like walls. Susceptible to security violations Requires more user knowledge
![Page 6: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/6.jpg)
WIRELESS NETWORK SECURITY METHODS
Wired Equivalent Privacy (WEP) Older method, still available to support older
devices No longer recommended The network security key used encrypts the
information that one computer sends to another computer across your network
However, WEP security is relatively easy to crack
![Page 7: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/7.jpg)
WIRELESS NETWORK SECURITY METHODS (CONTD.) Wi-Fi Protected Access (WPA)
Besides encrypting information, makes sure that the network security key has not been modified.
Authenticates users to help ensure that only authorized people can access the network
Version: WPA: Initial WPA version, to supply enhanced security
over the older WEP protocol WPA2: Successor of WPA, and replaces TKIP encryption
protocol with CCMP to provide additional security Target Users (authentication key distribution)
WPA-Personal: designed for home and small office networks and doesn’t require an authentication server
WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server
![Page 8: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/8.jpg)
WIRELESS NETWORK SECURITY METHODS (CONTD.) 802.1X authentication
Can help enhance security for 802.11 wireless networks and wired networks
Uses an authentication server to validate users and provide network access
On wireless networks, 802.11X can work with WEP or WPA keys
Typically used when connecting to a workplace network
![Page 9: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/9.jpg)
WHY DOES IT MATTER?
Unencrypted networks can expose your system to hackers and they can have access to: Websites you visit Emails you send and receive Files you send over the network FTP logins and files Instant Messaging Communication
![Page 10: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/10.jpg)
SECURING WIRELESS NETWORKS
Change Default Administrator Passwords(and Usernames)
Use a strong password Change the default SSID and disable its
broadcast Use good wireless encryption Upgrade your network adaptor top one that
works with WPA or WPA2 Use another layer of encryption when
possible(like SSH)
![Page 11: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/11.jpg)
SECURING WIRELESS NETWORKS (CONTD.)
Enable MAC address filtering Do not auto-connect to open Wi-Fi Networks Assign Static IP Addresses to Devices Enable Firewalls On Each Computer and the
Router Position the Router or Access Point Safely Turn Off the Network During Extended
Periods of Non-Use
![Page 12: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/12.jpg)
CONCLUSION
Risks are inherent in any wireless technology, but is still better than the wired technology
Security is most important, so use the best protection
WPA2 with AES is currently the most secure encryption method
Enable any additional security measures to secure your wireless network
![Page 13: WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE. OVERVIEW History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless](https://reader035.vdocuments.us/reader035/viewer/2022071710/56649dd15503460f94ac7e44/html5/thumbnails/13.jpg)
REFERENCES
http://compnetworking.about.com/cs/wireless/f/whatiswireless.htm
http://en.wikipedia.org/wiki/Wireless_security http://en.wikipedia.org/wiki/Wireless_LAN_sec
urity#Security_options http://en.wikipedia.org/wiki/Wi-Fi_Protected_A
ccess http://windows.microsoft.com/en-US/windows
-vista/What-are-the-different-wireless-network-security-methods
http://www.computer-encryption.com/2009/05/what-wifi-hackers-can-see-580.html