How To Secure Your Wireless Network With A Router (Nica) And A Network (Nipo) Card (Nic)
|
|
- Roy Malone
- 3 years ago
- Views:
Transcription
1 Wireless Network Security A self-instructional module Will Dressler Ryan Garcia Branden Hazlet ETEC 603 P. Leong February 2008
2 Wireless Network Security 1 Table of Contents Module Pre-test 2 Introduction. 3 Chapter 1: Securing Your Router Interface... 6 Review 6 Review Key and Explanations 6 Chapter 2: Wireless Encryption... 7 Review 7 Review Key and Explanations 7 Chapter 3: SSID Broadcast... 8 Review 10 Review Key and Explanations 11 Chapter 4: MAC Address Filtering Review 16 Review Key and Explanations 17 Module Post-test. 18
3 Wireless Network Security 2 Module Pre-test Please take this brief Pre-test so that we can assess your knowledge before you begin the module. 1. When a wireless router performs an SSID broadcast, what does it do? A. It sends out a code linked to a time signature for address resolution. B. It provides an interface console IP address for access via the web. C. It broadcasts the identification number of the machines network interface card physical address. D. It sends out a signal to identify itself by name and introduce its signal to computers in the area. 2. If you disable the SSID Broadcast from a wireless router, you have prevented. A. NIC s with unregistered MAC addresses from accessing your router. B. hackers from decoding your encryption passphrase. C. virus infected machines from accessing your registry keys. D. computers from automatically detecting the existence and name of your network signal. 3. What is the function of a MAC Address? A. It is a 12 character address used to allow other computers to find the location of your web page. B. It is unique and never changing address used for identification on a Network Interface Card. C. It is a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. D. It is a network protocol used to resolve GPS coordinates into a Physical Address. 4. MAC Address Filtering is a wireless security strategy that uses A. a list of pre-approved computer identification numbers to block out any unapproved computers. B. a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a network protocol used to block machine coordinates that do not have the right registration on the domain. D. an electronic camouflage to hide wireless information among the radio waves and cell phone signals that otherwise would be filtered out.
4 Wireless Network Security 3 Introduction Two relevant trends are coinciding in the technology industry: cyber-crimes are on the rise and wireless routers are becoming dramatically more common as they continue to come down in price. The decrease in price of wireless routers has led to a proliferation of unsecured wireless networks in the homes and offices of people who don't understand wireless security concepts. While all brands of routers come with basic how-to instructions that allow the user to navigate the router management interface, the instructions do not explain the concepts behind the router options to create a layered approach to wireless security. In this module you will learn about the concepts underlying four different strategies of wireless security. These four strategies include: limiting router interface access, disabling SSID broadcast, MAC address filtering and wireless encryption. Taken alone, each of these components can provide some minimal protection to your wireless network, but when used in combination, they will provide substantial protection using layers of different defense strategies. Much as a home burglar looks for easy prey, such as homes that have open doors or windows, hackers look for unprotected or weakly protected networks to steal confidential information. Understanding how a layered approach to wireless security works can help you prevent unwanted access to your network and the possible theft of personal information. To introduce the concepts behind these four strategies we will continue with the more familiar metaphor of home security. Specifically, we will use a metaphor based on strategies for securing the most important documents in your home -- i.e. financial records, passports, birth certificates, memorabilia, etc.
5 Wireless Network Security 4 Obviously the first step to securing your documents within your home is simply to control access to your home shut and lock your doors and windows. This basic strategy of home security parallels wireless security in terms of limiting access to your wireless router interface, simply shut and lock the door to your router to prevent the easiest path of unwanted access. In this metaphor, your door key will be a unique and complex password for your router interface access. A second level of defense in our metaphor of securing your home documents would be hiding the documents, possibly even camouflaging them in a compartment behind a framed photograph or poster. In terms of wireless security the analogous strategy would be disabling SSID broadcast, a strategy that essentially hides the signal coming from your wireless router so that it is not as easily discovered by people searching for a connection. If someone were to find your network, as if they were to find your documents, they could easily access your information. However, just by hiding the signal through disabling the SSID broadcast you make your information a good bit harder to get to. Our third comparison of home document security and wireless security is based on secret codes. For your sensitive financial information, including account numbers and PIN number for ATM cards, you might want to confuse anyone who discovered these records by adding 5 to every number; for example if your PIN number was , you could record it in your records as Thus even if someone found your records they still wouldn t know your PIN number unless they could figure out that the secret to decode the PIN number was to subtract 5 from the written information to get the correct information. The equivalent wireless security strategy is encryption, whereby information passed between a computer and the router is incomprehensible unless the computer knows the key for the secret code.
6 Wireless Network Security 5 Our final security metaphor is the coup de grâce, in terms of home document security it might be considered a little home vault or safe that requires a fingerprint ID to open. No one would be able to access the documents unless their fingerprint was preapproved to open the safe. In terms of wireless security this metaphor represents MAC address filtering, essentially using a fingerprint from the computer to check against a preapproved list of computers allowed to access to the wireless router. Taken individually, each of these components provides some basic security, but taken together, the combination of each of these unique strategies adds up to a powerful multilayered security system which would prevent all but the most skilled and lucky burglar from infiltrating your information. If your documents are locked securely behind your doors and windows, hidden behind a picture on the wall, encoded in secret cryptography, and locked in a fingerprint accessed vault -- you might fairly say you have document security. Likewise a wireless router employing interface access limits, disabled SSID broadcasting, encryption and MAC address filtering can be considered fairly secure. In both cases there is no such thing as absolute security, but by correctly employing many different layered strategies your degree of total security is improved tremendously.
7 Wireless Network Security 6 Chapter 1: Securing Your Router Interface Review Review Key and Explanations. These Chapters are intentionally left blank. For the purposes of this assignment they have not yet been developed.
8 Wireless Network Security 7 Chapter 2: Wireless Encryption Review Review Key and Explanations. These Chapters are intentionally left blank. For the purposes of this assignment they have not yet been developed.
9 Wireless Network Security 8 Chapter 3: SSID Broadcast Chapter 3 has two skill sets for you to master: Section A. Identify the function of an SSID. Section B. Determine how disabling the SSID Broadcast can contribute to wireless security. Section A. Identify the function of an SSID Service Set Identifiers (SSIDs) are the Names of wireless routers. To have a computer talk to the router, the computer first must know that the router exists and then must know the name, SSID, of the router. To make it easy to connect to a wireless router, the router usually sends out a broadcast that is picked up by all wireless computers within range; this broadcast is essentially the router introducing itself, Hello, my name is (some SSID) and I m here to connect with you if you want. Initially, almost all routers come with the default SSID of the manufacturers name, i.e. Dlink, Linksys, Cisco, Netgear, 3Com, etc. Leaving the default name intact is a clue for any hacker that the network is not secure and it often can give them easy access to the default router interface username and password, which can be easily found from manufacturers websites. Example and Non-Example: If there are two wireless routers in a neighborhood, Router A and Router B, when a laptop scans for wireless signals, it will detect these two separate signals according to their SSID. For example, Router A may have the default factory name of Linksys, while Router B could have the name Gypsy Radio. In this case of Router A, Linksys, it still has the default SSID provided by the manufacturer. The SSID gives away the manufacturer of the router, which can be used to search the internet for the default administrator username and password. Router B, on the other hand, has a unique SSID, Gypsy Radio, which prevents hackers from knowing the manufacturer and the associated default password of the router. A hacker would more easily infiltrate Router A.
10 Wireless Network Security 9 Section B. Determine how disabling the SSID Broadcast can contribute to wireless security To refer back to our metaphor of securing your home documents, the second level of defense after closing your doors and windows, would be to hide your documents. For instance, you might hide them by them by putting them in a compartment that is camouflaged behind a framed photograph hung on the wall. In terms of wireless security the analogous strategy would be disabling SSID broadcast, a strategy that essentially hides the signal coming from your wireless router so that it is not as easily discovered by people searching for a connection. If someone were to find your network, as if they were to find your documents, they could easily access your information. However, just by hiding the signal by disabling the SSID broadcast you make your information a good bit harder to get to. If Disable the SSID broadcast is selected in the router interface, the router is prevented from sharing its name and availability. Therefore, most computers won t discover the existence of the router and wireless signal, much less connect to it. Example and Non-Example: There are two wireless routers in the room, Router X and Router Y. Both X and Y are internet connected and neither requires a password. The routers are configured exactly the same except for the SSID broadcast settings: Router X has SSID broadcast enabled, while Y has SSID broadcast disabled. When a laptop is turned on in the room, it will only detect one signal- Router X. The laptop will not detect a signal from Router Y because Router Y is not broadcasting its SSID. Router Y is essentially hidden from the laptop, therefore, Router Y is more secure because disabling its SSID broadcast has made it harder to find.
11 Wireless Network Security 10 Chapter 3: SSID Broadcast Review 1. Wireless routers send out signals to identify themselves and introduce their signal to computers in the area. What is this called? A. SSID Broadcast B. Interface Access Announcement C. WEP Encryption Key D. MAC Address Sharing 2. Wireless routers usually send out signals with their names and availability for connection to all computers in the area. If you configure a router to prevent this signal from going out, what have you done? A. Implemented WEP Encryption Keys B. Corrupted the Interface Access Announcement C. Disabled SSID Broadcast D. Disabled MAC Address Sharing
12 Wireless Network Security 11 Chapter 3: SSID Broadcast Review Key and Explanations 1. Wireless routers broadcast a signals to identify themselves and introduce their signal to computers in the area. What is this called? A. *SSID Broadcast Correct, the SSID Broadcast is a signal to identify the router and introduce its signal to computers in the area. B. Interface Access Announcement Incorrect, the interface is not a signal C. *. WEP Encryption Key Incorrect, encryption is coded signals. D. MAC Address Sharing Incorrect, MAC addresses identify the NIC, not the router. 2. Wireless routers usually send out signals with their names and availability for connection to all computers in the area. If you configure a router to prevent this signal from going out, what have you done? A. Implemented WEP Encryption Keys Incorrect, encryption is coded signals. B. Corrupted the Interface Access Announcement Incorrect, the interface is not a signal C. * Disabled SSID Broadcast Correct, if you prevent your router from sending out a signal with its name and availability for connection to all computers in the area then you have Disabled SSID Broadcast. D. Disabled MAC Address Sharing Incorrect, MAC addresses identify the NIC, not the router.
13 Wireless Network Security 12 Chapter 4: MAC Address Filtering Chapter 3 has two skill sets for you to master: Section A:. Identify the function of a Media Access Control (MAC) address on a Network Interface Card. Section B: Determine how MAC Address filtering can contribute to wireless security. Section A: Identify the function of a MAC address on a NIC A computer uses a network interface card (NIC) to get on the internet. Each NIC has a unique identification code called a Media Access Control (MAC) address. The MAC address is also sometimes called the Physical Address because it is physically hard coded into the Network Interface Card. This MAC address is used for identification in the same way people use fingerprints or Social Security Numbers, a unique identifier that is connected to you. The MAC address is actually written as 12 characters arranged in six sets of two, with each set of characters separated either by colons or hyphens. Because MAC addresses are unique, like a person s fingerprints, no two are the same across the world. And because they are located on the computer s NIC, including wireless NIC s, they provide an individual identification for each computer when it connects to a network. Example 1: In this example we see a picture of a Network Interface Card (NIC) that has been removed from a computer. Note that on the left side of the front of the card is a sticker that has the MAC Address -- six sets of two characters ( A 63) that uniquely identify this card and any computer that would use this card for a network connection. The important concept to note here is that the MAC address is coded into the NIC itself, and never changes, even if the card is removed from the computer.
14 Wireless Network Security 13 Example 2: Here is a screenshot that contains information about the NIC and the MAC address for a wireless NIC installed in a computer. The first highlighted line says Ethernet adapter Wireless Network Connection: which indicates that we are looking at data for the wireless NIC. In the second highlighted line, titled Physical Address: is where we see a 12-character sequence of six sets of 2 characters separated by hyphens; this is the MAC Address. The important thing to recognize from this example is that the MAC address is part of the NIC data for the network connection. Non-Examples: Note the line that says IP address in example 2 above. The IP address that a computer uses for communicating with the internet is different than the MAC Address in important ways. IP addresses are not always unique and in fact sometimes change dynamically such that a new address is assigned every time a computer connects to the network. This is different because MAC addresses are constant, they are always the same for the particular NIC they are coded into and always stay the same when the computer connects to the network day after day.
15 Wireless Network Security 14 Section B: Determine how MAC Address Filtering Can Contribute to Wireless Security To begin our discussion of MAC address filtering let us refer back to our metaphor in terms of home document security. MAC address filtering could be said to be analogous to a little home vault or safe that requires a fingerprint ID to open. No one would be able to access the documents unless their fingerprint was preapproved to open the safe. In terms of wireless security this metaphor represents MAC address filtering, essentially using a fingerprint from the computer to check against a preapproved list of computers allowed to access to the wireless router. MAC address filtering is a way of coding into the router a limited list of computers that are allowed to talk to the router. Every network interface card (NIC), whether it is a wireless or a wired connection card, has a MAC Address. The MAC address is a totally unique character set for every individual NIC, so it can therefore be used to identify individual machines that connect to the network. MAC address filtering is a way of blocking all machines from attaching to the router except for the ones that are specifically allowed by previously entering them into the router s list of pre-approved MAC Addresses. It s like having a bouncer at a nightclub who only lets in people whose name is on a list. This is a strong way to keep unwanted computers from connecting to the router, but it can also be tedious to update when new computers or guests want to connect to the wireless network. Example: Router MAF has MAC address filtering enabled so only computers whose MAC addresses have been approved and entered into the interface by the router administrator will be able to connect to Router MAF. Even if a hacker discovers the router s SSID and Encryption key, she will have a much more difficult time connecting
16 Wireless Network Security 15 with Router MAF, because her computer will not be in the preapproved list that MAC address filtering allows into the router. Non-Example: Router X does not have MAC address filtering enabled. If a hacker discovers the router s SSID and Encryption key he will be able to connect with Router X.
17 Wireless Network Security 16 Chapter 4: Review 1. The unique identification number that never changes on a Network Interface Card is called the: A. Internet Protocol (IP) Address B. Media Access Control (MAC) address C. Serial Number (S/N) D. Special Security Number (SSN) 2. If you restrict access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC), what security strategy are you using? A. WEP Encryption Key B. Interface Access Pass Code C. SSID Number Blocking D. MAC Address Filtering
18 Wireless Network Security 17 Chapter 4: MAC Address Filtering Review Key and Explanations 1. The unique identification number that never changes on a Network Interface Card is called the: A. Internet Protocol (IP) Address - Incorrect. IP addresses do change. B. Media Access Control (MAC) address - Correct, the MAC Address is a unique identification number that never changes on a Network Interface Card. C. Serial Number (S/N) - Incorrect. The serial number refers to the make and model of the NIC. D. Special Security Number (SSN) - Incorrect. This is a fictional item. 2. If you restrict access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC), what security strategy are you using? A. WEP Encryption Key Camouflage Incorrect, encryption keys are for decoding signals. B. Interface Access Code Filtering Incorrect, the interface is not on the NIC. C. SSID Broadcast Interrupt Incorrect, the SSID is not on the NIC. D. MAC Address Filtering Correct, MAC Address Filtering restricts access to your wireless network based on the unique identification number on the connecting computers Network Interface Card (NIC),
19 Wireless Network Security 18 Module Post-test Please take this brief Post-test so that we can assess what you have learned from this module. 1. The function of an SSID broadcast can best be described as A. sending out a signal to identify the computer by name and introduce its signal to computers in the area. B. providing an interface console IP address for access via the web. C. sending out the identification number of the machines network interface card physical address. D. sending out a code linked to a time signature for address resolution. 2. If you do not disable the SSID Broadcast from a wireless router, you will allow. A. NIC s with unregistered MAC addresses from accessing your router. B. hackers from decoding your encryption passphrase. C. computers from automatically detecting the existence and name of your network signal D.. virus infected machines from accessing your registry keys. 3. The function of a MAC address can best be described as? A. a 12 character address used to allow other computers to find the location of your web page. B..a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a unique and never changing address used for identification on a Network Interface Card D. a network protocol used to resolve GPS coordinates into a Physical Address. 4. Which of the following best describes MAC address filtering? A.. an electronic camouflage to hide wireless information among the radio waves and cell phone signals that otherwise would be filtered out. B. a code for encrypting a signal so that people without the appropriate passphrase can not decode your message. C. a network protocol used to block machine coordinates that do not have the right registration on the domain. D. a list of pre-approved computer identification numbers to block out any unapproved computers
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
More informationTop 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
More informationSecurity Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
More informationIf security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking
More information9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
More informationConfiguring Routers and Their Settings
Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because
More informationComputing From Home. How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services
Computing From Home How to Access Rowan Network Resources When you Are Not On Campus. Marc Fleischner Network and System Services There is no reason for any individual to have a computer in his home. Ken
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationQuestion How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationSecuring your Linksys WRT54G
Securing your Linksys WRT54G Abstract Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these
More informationSecuring your Linksys Wireless Router BEFW11S4 Abstract
Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms
More informationN300 WiFi Range Extender WN2000RPT User Manual
N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,
More informationTHE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123
THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions
More informationSecurity. TestOut Modules 12.6 12.10
Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card
More informationChapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
More informationHome Wi-Fi Gateway Instructions
Home Wi-Fi Gateway Instructions 1. Connect the gateway. Use the coaxial cable provided by BendBroadband to connect the cable port (A) to your cable outlet. 2. Connect your computer to the cable modem gateway
More informationN300 WiFi Range Extender
Model EX2700 User Manual July 2014 202-11395-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number on
More informationConfiguring Your Network s Security
Configuring Your Network s Security Security is an important issue when using a wireless home network. Because radio waves are used to transfer information between your networked computers, it's possible
More informationA quick Guide to your Super Hub 2ac
A quick Guide to your Super Hub 2ac HELLO. W el c o m e t o t h i s h a n d y g u i d e t o y o u r n ew v i r g i n m e d i a b u s i n e s s b r o a d b a n d. What s inside Getting to know your Super
More informationConfiguring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)
Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list) Hackers can easily trap information transmitted over wireless network, it has to be encrypted to avoid unauthorized users
More informationFrequently Asked Questions
FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?
More informationLinksys Wireless G WRT54G
Router Configuration Note Linksys Wireless G WRT54G Version 1.0 Scope This document describes how to configure the Linksys Wireless G WRT54G router to work with LucidLink Wireless Security Software, version
More informationLinksys WAP300N. User Guide
User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating
More informationWi-Fi and security Wireless Networking and Security by Alain RASSEL
Wi-Fi and security Wireless Networking and Security by Alain RASSEL 1 23.11.04 Overview: Simple configuration example Obvious simple protection means Change Administrator Password Restrict administrator
More informationSection 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
More informationAC750 WiFi Range Extender
Model EX6100 User Manual April 2014 202-11307-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
More informationFigure 1. The Motorola SB4200 cable modem
Setting Up a Home Wireless Network What You Need If you're still using a dial-up modem to access the Internet, it's time to consider broadband. Depending on where you live, you can either opt for a cable
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationVantage RADIUS 50. Quick Start Guide Version 1.0 3/2005
Vantage RADIUS 50 Quick Start Guide Version 1.0 3/2005 1 Introducing Vantage RADIUS 50 The Vantage RADIUS (Remote Authentication Dial-In User Service) 50 (referred to in this guide as Vantage RADIUS)
More informationVIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
More informationFrequently Asked Questions
Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous
More informationComputer Networking. Definitions. Introduction
Computer Networking Definitions DHCP Dynamic Host Configuration Protocol It assigns IP addresses to client devices, such as desktop computers, laptops, and phones, when they are plugged into Ethernet or
More informationCyber Security: Beginners Guide to Firewalls
Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started
More informationReferences NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household
This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of
More informationEssentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library
Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library Why should you be concerned? There are over 1 million known computer viruses. An unprotected computer on the
More informationNetwork Security Best Practices
CEDIA WHITE PAPER Network Security Best Practices 2014 CEDIA TABLE OF CONTENTS 01 Document Scope 3 02 Introduction 3 03 Securing the Router from WAN (internet) Attack 3 04 Securing the LAN and Individual
More informationMechanic Handheld Wireless Access Point Setup Guide
Pre-Installation Manual Mechanic Handheld Wireless Access Point Setup Guide February 2014 / 10-095400-085 Mechanic Handheld Wireless Access Point Setup Guide Pre-Installation Manual February 2014 by the
More informationWireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
More informationCyber Security Beginners Guide to Firewalls A Non-Technical Guide
Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.
More informationDV230 Web Based Configuration Troubleshooting Guide
DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254
More informationOnline Banking Fraud Prevention Recommendations and Best Practices
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee at Continental National Bank of Miami needs to know
More informationINFORMATION TECHNOLOGY. Revised May 07. Home Networking Guide
INFORMATION TECHNOLOGY Revised May 07 Home Networking Guide Contents Introduction... 3 Intent... 3 Disclaimer... 3 Rexnord Support limitations... 3 Remotely Connecting to the Rexnord Data Network... 3
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More informationChapter 3 Connecting the Router to the Internet
Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT
More informationwireless broadband information
wireless broadband information what is wireless? contents When we talk about a Wireless connection we are referring to the way you connect your PC or laptop to your router. Wireless broadband, also known
More informationPreparing the Computers for TCP/IP Networking
Configuration Preparing the Computers for TCP/IP Networking Configuring Windows 98, and ME for TCP/IP Networking Verifying TCP/IP Properties Configuring Windows 2000 or XP for IP Networking Install or
More informationCyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
More informationSTEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address
Title: How do I configure the wireless printer without a network cable and install the printer driver in Windows? NOTE: For successful wireless setup, you MUST know your network security settings. STEP
More informationRingCentral Router Configuration. Basic Start Guide for Administrators
RingCentral Router Configuration Basic Start Guide for Administrators RingCentral Router Configuration Basic Start Guide for Administrators Contents 3 Getting Started 4 Quality of Service 4 Test Your Connection
More informationConfiguring the wireless security of your Linksys Wireless-N router through the web-based setup page
Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding
More informationHigh Speed Internet, Welcome Kit. If your apartment is served by Ethernet: How do I connect to the network if not using a router?:
High Speed Internet, Welcome Kit We provide a WIRED High Speed Internet connection to your apartment. Your apartment will be served by a DSL modem or Ethernet jack. If you have multiple users in your apartment
More informationChapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
More informationAccess Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
More informationQuick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
More informationNetworking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
More informationWiFi-SB-L3 300M WiFi Router WiFi Bridge WiFi Repeater. WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide
300M WiFi Router WiFi Repeater WiFi Bridge WiFi-SB-L3 Quick Setting Guide 1 Chapter 1 Router Mode Quick Setup Guide 1. Let WiFi-SB-L3 be powered on. 2.Turn on wireless network connection, disabled local
More information8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
More informationHow To. Simply Connected. XWR-1750 Basic Configuration INTRODUCTION
XWR-1750 Basic Configuration How To DOCUMENT INTRODUCTION This document will guide you through the initial setup of the XWR-1750 for basic functionality. What should I do? We recommend, you change your
More informationWireless Encryption Protection
Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost
More information8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
More informationUser Guide. E-Series Routers
User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router
More informationAXIS 207W Network Camera Technical Information
A few things that should help you get the AXIS 207W connected to your network. It s not always easy to install new products on your network and this document describes some of the things you may need to
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationDigicom Remote Control for the SRT
Digicom Remote Control for the SRT To operate the SRT remotely, use Remote Desktop; this is available free for Linux, Mac OS-X (from Microsoft), and is included with Windows XP and later. As RD uses a
More informationNetwork Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
Network Security Chapter 12 Learning Objectives After reading this chapter, you should be able to: Recognize the basic forms of system attacks Recognize the concepts underlying physical protection measures
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationChapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
More informationSetting Up Your Wireless Network
Setting Up Your Wireless Network 1 TABLE OF CONTENTS Wireless Tips... 3 Terminology... 4 Motorola 2247... 5 Logging In:... 5 Changing the SSID/network name... 6 Westell Model 7500... 12 Configuration of
More informationN600 WiFi USB Adapter
Model WNDA3100v3 User Manual December 2014 202-11470-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationWi-Fi Settings Guide. Model No. SP 212/SP 213 Series
Wi-Fi Settings Guide Model No. SP 212/SP 213 Series Introduction There are two wireless LAN modes: infrastructure mode for connection through an access point and ad-hoc mode for establishing direct connection
More informationWireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
More informationWhy is a strong password important?
Internet Security Why is a strong password important? Identity theft motives: To gain access to resources For the challenge/fun Personal reasons Theft methods Brute forcing and other script hacking methods
More informationA Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
More informationLink Link sys E3000 sys RE1000
User Guide High Performance Extender Wireless-N Router Linksys Linksys RE1000 E3000Wireless-N Table of Contents Contents Chapter 1: Product Overview 1 Front 1 Top 1 Bottom 1 Back 2 Chapter 2: Advanced
More informationPractice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com)
Practice test 220-802 Domain-2 Security (Brought to you by RMRoberts.com) 1. Which command is used to access the local group policy editor for Windows 7? A. poledit.exe B. gpedit.msc C. local.msc D. grplocal.exe
More informationReliance Bank Fraud Prevention Best Practices
Reliance Bank Fraud Prevention Best Practices May 2013 User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters and numbers.
More informationIntegrating a Hitachi IP5000 Wireless IP Phone
November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition
More information2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21
Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................
More informationAC1200 WiFi Range Extender
Model EX6200 User Manual February 2014 202-11298-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the serial number
More informationBasic Computer Security Part 2
Basic Computer Security Part 2 Presenter David Schaefer, MBA OCC Manager of Desktop Support Adjunct Security Instructor: Walsh College, Oakland Community College, Lawrence Technology University Welcome
More informationCyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
More informationManual Wireless Extender Setup Instructions. Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key
1 Manual Wireless Extender Setup Instructions Before you start, there are two things you will need. 1. Laptop computer 2. Router s security key Setting up LAN Static IP on PC We need to set up a Static
More informationAC1900, N900, and N450 WiFi Cable Data Gateways
AC1900, N900, and N450 WiFi Cable Data Gateways Models C6300BD, CG4500BD, and CG3000Dv2 User Manual March 2015 202-11434-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationConnecting to Wireless networks and hotspots
Connecting to Wireless networks and hotspots How to connect to a wireless network on the ipad and troubleshoot problems The ipad is ultimately a device that allows you to consume content in an easy and
More informationUsing Microsoft Vista and Windows XP to Manage Wireless Network Connections
Application Note Using Microsoft Vista and Windows XP to Manage Wireless Network Connections Summary This document explains how to use Microsoft Vista and Windows XP (SP2 and SP 1) to join a wireless network
More informationALL0237R. Wireless N 300Mbit Access Point/Repeater. User s Manual
ALL0237R Wireless N 300Mbit Access Point/Repeater User s Manual ALLNET ALL0237R User Manual Table of Contents About the Device... 3 Minimum System Requirements... 5 Package Contents... 5 Device Overview...
More informationA6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual
802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the
More informationHow To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?
Is it really necessary for the three ports mentioned in Troubleshooting (UDP 88, UDP 3074, and TCP 3074) to be opened for Xbox Live to work properly? Most cable/dsl routers implement Network Address Translation
More informationWireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
More informationUSER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350
USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................
More informationHow To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
More informationTHE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 9, Sep 2015, pp. 65-74, Article ID: IJECET_06_09_008 Available online at http://www.iaeme.com/ijecetissues.asp?jtype=ijecet&vtype=6&itype=9
More informationSecuring Your Wireless Network
Choosing A Wireless Router You might already have a wireless router provided to you by your Internet Service Provider. Otherwise, if you are intending to get one or decide to upgrade your old router, look
More informationFI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera
Model: FI8910W Quick Installation Guide (For Windows OS) (For MAC OS please go to page 17) Indoor MJPEG Pan/Tilt Wireless IP Camera Black White Package Contents IP Camera FI8910W with IR-Cut.x 1 DC Power
More informationThe Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
More information