Similar documents
9 Simple steps to secure your Wi-Fi Network.

Chapter 3 Safeguarding Your Network

MN-700 Base Station Configuration Guide

Top 10 Security Checklist for SOHO Wireless LANs

Security Awareness. Wireless Network Security

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

Chapter 2 Configuring Your Wireless Network and Security Settings

Wireless Encryption Protection

Top 10 Security Checklist for SOHO Wireless LANs

Question How do I access the router s web-based setup page? Answer

Chapter 2 Wireless Settings and Security

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

FD Wi-Fi Terminals. FD100 Ti /200 Ti /300 Ti Quick set-up Guide

Configuring Routers and Their Settings

WiFi Security Assessments

Network Security Best Practices

CONNECTING THE RASPBERRY PI TO A NETWORK

Securing your Linksys Wireless Router BEFW11S4 Abstract

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

AC750 WiFi Range Extender

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

WLAN Authentication and Data Privacy

DATA PROJECTOR XJ-A135/XJ-A145/XJ-A235/ XJ-A245

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Wireless Network Best Practices for General User

Network Installation Guide

Figure 1. The Motorola SB4200 cable modem

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Particularities of security design for wireless networks in small and medium business (SMB)

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

DV230 Web Based Configuration Troubleshooting Guide

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

Securing your Linksys WRT54G

DATA PROJECTOR XJ-A146/XJ-A246/XJ-A256

N300 WiFi Range Extender WN2000RPT User Manual

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

N300 WiFi Range Extender

PIXMA MX920. series. Setup Guide

Developing Network Security Strategies

Kvaser BlackBird Getting Started Guide

Using the Control Panel for Wireless Network Installation. WorkForce 600 Series Artisan 700 Series

WLAN Security Networking with Confidence

DATA PROJECTOR XJ-A147/XJ-A247/XJ-A257 XJ-M146/XJ-M156 XJ-M246/XJ-M256. XJ-A Series. XJ-M Series. Network Function Guide

N300 WiFi Range Extender

How to configure your Thomson SpeedTouch 780WL for ADSL2+

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

User Guide. Verizon 4G LTE Broadband Router

Wireless Cable Gateway CG3100Dv3

Configuring the WT-4 for ftp (Infrastructure Mode)

USER GUIDE Cisco Small Business

The next generation of knowledge and expertise Wireless Security Basics

RingCentral Router Configuration. Basic Start Guide for Administrators

Security in Wireless Local Area Network

Configuring the WT-4 for Upload to a Computer (Infrastructure Mode)

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Wireless Networks. Welcome to Wireless

WIRELESS NETWORKING SECURITY

Universal Pass Through WiFi Range Extender WN3100RP

University of Hawaii at Manoa Professor: Kazuo Sugihara

A Division of Cisco Systems, Inc. Wireless-G. User Guide. Broadband Router WIRELESS WRT54GL (EU/LA) Model No.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Technical Support Information

WL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual

Authentication in WLAN

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Chapter 4 Customizing Your Network Settings

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Basic Computer Security Part 2

Table of Contents. Wireless Security...40 What is WEP?...40 Configure WEP...41 What is WPA?...42 Configure WPA-PSK (Personal)

Securing end devices

Connecting your Blu-ray Disc / DVD Player to your Wi-Fi Network

N300 Wireless Router WNR2000v4 User Manual

Wireless VPN White Paper. WIALAN Technologies, Inc.

Preparing the Computers for TCP/IP Networking

G.DUO. Dual 11g Access Point. User s Manual

How To Secure Wireless Networks

Wireless N 150 PCI Desktop Adapter

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

N450 Wireless Router WNR2500

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Configuring Security Solutions

Network Installation Guide. WorkForce 600 Series Artisan 700 Series Artisan 800 Series

Setting up a WiFi Network (WLAN)

AC1900, N900, and N450 WiFi Cable Data Gateways

Wireless N150 Access Point WN604

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

Transcription:

If security were all that mattered, computers would never be turned on, let alone hooked into a network with literally millions of potential intruders. Dan Farmer, System Administrators Guide to Cracking The only secure computer is one that's unplugged, locked in a safe, and buried 20 feet under the ground in a secret location... and I'm not even too sure about that one -- Dennis Huges, FBI NETWORK SECURITY

FIREWALLS Function: "A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality or result in data corruption or denial of service. A network firewall sits at the junction point or gateway between the two networks, usually a private network and a public network such as the Internet. The earliest computer firewalls were simple routers. The term "firewall" comes from the fact that by segmenting a network into different physical subnetworks, they limited the damage that could spread from one subnet to another (ie. just like firedoors or firewalls)

TYPES OF FIREWALLS Network Level Hardware device (Figure Left) Application Level Software program (Figure Right) running on a secure host computer. Both must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to

ENCRYPTION Function: The process of making data unreadable by other humans and/or computers for the purpose of preventing others from gaining access to its contents. Public key can be viewed or used by anyone Private key is kept secret by the creator and is the only method of decrypting the data encrypted by the public key.

AUTHENTICATION Used to describe the process of identifying a person/data and making sure they are really who they say they are. For example, a password is a very basic method of authorizing someone.

WEP Wired Equivalent Privacy Designed to provide the same security as a wired LAN Allows a group of devices (i.e. computers) on a network to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders. Is comprised of hexadecimal numbers (0 to 9 and A to F) The keys must match on the devices for communication to occur Length of WEP key can be changed 64-bit WEP: 10 digit key 128-bit WEP: 26 digit key 256-bit WEP: 58 digit key

WEP ISSUES Serious flaws were found in 2001 WEP has led a troubled existence due to many security issues. A high percentage of wireless networks have WEP disabled because of the administrative overhead of maintaining a shared WEP key. WEP has the same problem as all systems based upon shared keys: any secret held by more than one person soon becomes public knowledge. Take for example an employee who leaves a company they still know the shared WEP key. The ex-employee could sit outside the company with an 802.11 NIC and sniff network traffic or even attack the internal network.

WPA & WPA2 Wi-Fi Protected Access Enhanced on the technology of WEP in 2003 Designed to prevent the vulnerabilities of WEP WPA2 replaced WPA in 2004 One variation of WPA is called WPA Pre Shared Key WPA-PSK works well for home networks I. To use WPA-PSK, a person sets a static key or "passphrase" similar to as with WEP. You will NeVer Gu3e5 this K3y but It ShOlD b3 L0nG3r II. III. But, using TKIP (Temporal Key Integrity Protocol), WPA-PSK automatically changes the keys at a preset time interval Making it more difficult for hackers to find and exploit them.

WIRELESS IMPLEMENTATION Wireless Access or Router During setup you should be able to select the security protocol to use Default in many is WEP Use at least WPA or WPA2 Create a passphrase that is strong (upper and lowercase letters, numbers, and symbols if possible) Client Side Whenever you try to connect to a secured wireless network you should be prompted for the passphrase Passphrase available from administrator or provider

1. Change default Administrator password 2. Enable WPA or WPA2 encryption 3. Change your network SSID Change to something that has meaning to you, but will not identify to an outside location / identity 4. Enable MAC Address filtering Allows you to specify the specific MAC address of the devices you authorize to connect on the network Hackers can fake MAC address though

5. Disable SSID Broadcast This will prevent your router from broadcasting your wireless network to potential clients (most likely not needed in a home environment) This setup is needed typically at Hotspot locations 6. Do Not Auto-Connect to Open Wi-Fi Networks Auto connecting to open Wi-Fi networks can expose your computer to risks 7. Assign Static IP Addresses to Devices Set fixed IP address for your network devices Turn off DHCP feature of the router so hackers cannot acquire a valid IP address Set a fixed range of IP addresses to only be allowed

8. Enable Firewalls On Each Computer and the Router Make sure the router firewall is engaged Extra protection, consider running personal firewall software on computers inside network 9. Position the Router or Access Point Safely Try to position the router centrally in the house to reduce network signal spanning to far outside 10. Turn Off the Network During Extended Periods of Non-Use Not practical to shut down all the time, but turn off the network when travelling or away an extended length of time