1 / 13

WIRELESS SECURITY

WIRELESS SECURITY. ASHIMA SOOD PEYTON GREENE. OVERVIEW. History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless Networks (Tips) Conclusion. HISTORY.

love
Download Presentation

WIRELESS SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE

  2. OVERVIEW • History • Introduction to Wireless Networking • Wireless Network Security Methods • Securing Wireless Networks (Tips) • Conclusion

  3. HISTORY • The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson. • The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines. • And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world.

  4. What is a wireless network? • Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices.

  5. Pros & cons of wireless networking • Pros • Mobility • Elimination of unsightly wires • Thus, convenient and easy to use • Cons • Potential for radio interference due to weather, other wireless devices, or obstructions like walls. • Susceptible to security violations • Requires more user knowledge

  6. Wireless Network Security Methods • Wired Equivalent Privacy (WEP) • Older method, still available to support older devices • No longer recommended • The network security key used encrypts the information that one computer sends to another computer across your network • However, WEP security is relatively easy to crack

  7. Wireless Network Security Methods (contd.) • Wi-Fi Protected Access (WPA) • Besides encrypting information, makes sure that the network security key has not been modified. • Authenticates users to help ensure that only authorized people can access the network • Version: • WPA: Initial WPA version, to supply enhanced security over the older WEP protocol • WPA2: Successor of WPA, and replaces TKIP encryption protocol with CCMP to provide additional security • Target Users (authentication key distribution) • WPA-Personal: designed for home and small office networks and doesn’t require an authentication server • WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server

  8. Wireless Network Security Methods (contd.) • 802.1X authentication • Can help enhance security for 802.11 wireless networks and wired networks • Uses an authentication server to validate users and provide network access • On wireless networks, 802.11X can work with WEP or WPA keys • Typically used when connecting to a workplace network

  9. Why does it matter? • Unencrypted networks can expose your system to hackers and they can have access to: • Websites you visit • Emails you send and receive • Files you send over the network • FTP logins and files • Instant Messaging Communication

  10. Securing wireless networks • Change Default Administrator Passwords(and Usernames) • Use a strong password • Change the default SSID and disable its broadcast • Use good wireless encryption • Upgrade your network adaptor top one that works with WPA or WPA2 • Use another layer of encryption when possible(like SSH)

  11. Securing wireless networks (contd.) • Enable MAC address filtering • Do not auto-connect to open Wi-Fi Networks • Assign Static IP Addresses to Devices • Enable Firewalls On Each Computer and the Router •  Position the Router or Access Point Safely • Turn Off the Network During Extended Periods of Non-Use

  12. Conclusion • Risks are inherent in any wireless technology, but is still better than the wired technology • Security is most important, so use the best protection • WPA2 with AES is currently the most secure encryption method • Enable any additional security measures to secure your wireless network

  13. references • http://compnetworking.about.com/cs/wireless/f/whatiswireless.htm • http://en.wikipedia.org/wiki/Wireless_security • http://en.wikipedia.org/wiki/Wireless_LAN_security#Security_options • http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access • http://windows.microsoft.com/en-US/windows-vista/What-are-the-different-wireless-network-security-methods • http://www.computer-encryption.com/2009/05/what-wifi-hackers-can-see-580.html

More Related