120 likes | 211 Views
Wireless Security. Tabatha Lakkala. Outline. Wireless Access Points Define Wireless Access Points Hidden and not so hidden dangers How to protect yourself and information Bluetooth and Cellphones Define Bluetooth H idden dangers How to protect yourself and information Phone Usage
E N D
Wireless Security Tabatha Lakkala
Outline • Wireless Access Points • Define Wireless Access Points • Hidden and not so hidden dangers • How to protect yourself and information • Bluetooth and Cellphones • Define Bluetooth • Hidden dangers • How to protect yourself and information • Phone Usage • What is the bottom line?
Wireless devices connecting to wired network Connections in the home Connections in the office Wireless hotspots almost everywhere Wireless Access Points
Dangers • War Driving • War Chalking • Rogue Access Points (Evil Twin)
Network Protection • Secure your router/access point • Types of antenna and location • No broadcasting • MAC filtering • Enable encryption
Bluetooth & Cellphones • Wireless communication for small devices
Bluetooth Dangers • Bluejacking • Bluesnarfing
Cellphone Protection • Know your security modes • Disable the Bluetooth
What is the bottom line? • Security threats are rising • Let’s protect our information • Know your enemy and arm yourself
Summary • Wireless Access Points • Define Wireless Access Points • Hidden and not so hidden dangers • How to protect yourself and information • Bluetooth and Cellphones • Define Bluetooth • Hidden dangers • How to protect yourself and information • Phone Usage • What is the bottom line?
Questions ? Samuelle, T.J. (2011). Mike Meyers’ Certification Passport: CompTIA Security+. New York: McGraw Hill Company. References