130 likes | 211 Views
WIRELESS SECURITY. ASHIMA SOOD PEYTON GREENE. OVERVIEW. History Introduction to Wireless Networking Wireless Network Security Methods Securing Wireless Networks (Tips) Conclusion. HISTORY.
E N D
WIRELESS SECURITY ASHIMA SOOD PEYTON GREENE
OVERVIEW • History • Introduction to Wireless Networking • Wireless Network Security Methods • Securing Wireless Networks (Tips) • Conclusion
HISTORY • The first Wireless LAN (1971) when networking technologies met radio communications at the University of Hawaii as a research project called ALOHANET, under the leadership of Norman Abramson. • The bi-directional star topology of the system included 7 computers deployed over 4 islands to communicate with the central computer on the Oahu Island without using phone lines. • And so, wireless technology, as we know it, began its journey into every house, classroom, and business around the world.
What is a wireless network? • Wireless networks utilize high frequency radio waves and/or microwaves instead of copper and/or fiber optic cabling (as in case of wired technology), to maintain communication channels between network devices.
Pros & cons of wireless networking • Pros • Mobility • Elimination of unsightly wires • Thus, convenient and easy to use • Cons • Potential for radio interference due to weather, other wireless devices, or obstructions like walls. • Susceptible to security violations • Requires more user knowledge
Wireless Network Security Methods • Wired Equivalent Privacy (WEP) • Older method, still available to support older devices • No longer recommended • The network security key used encrypts the information that one computer sends to another computer across your network • However, WEP security is relatively easy to crack
Wireless Network Security Methods (contd.) • Wi-Fi Protected Access (WPA) • Besides encrypting information, makes sure that the network security key has not been modified. • Authenticates users to help ensure that only authorized people can access the network • Version: • WPA: Initial WPA version, to supply enhanced security over the older WEP protocol • WPA2: Successor of WPA, and replaces TKIP encryption protocol with CCMP to provide additional security • Target Users (authentication key distribution) • WPA-Personal: designed for home and small office networks and doesn’t require an authentication server • WPA-Enterprise: designed for enterprise networks, and requires a RADIUS authentication server
Wireless Network Security Methods (contd.) • 802.1X authentication • Can help enhance security for 802.11 wireless networks and wired networks • Uses an authentication server to validate users and provide network access • On wireless networks, 802.11X can work with WEP or WPA keys • Typically used when connecting to a workplace network
Why does it matter? • Unencrypted networks can expose your system to hackers and they can have access to: • Websites you visit • Emails you send and receive • Files you send over the network • FTP logins and files • Instant Messaging Communication
Securing wireless networks • Change Default Administrator Passwords(and Usernames) • Use a strong password • Change the default SSID and disable its broadcast • Use good wireless encryption • Upgrade your network adaptor top one that works with WPA or WPA2 • Use another layer of encryption when possible(like SSH)
Securing wireless networks (contd.) • Enable MAC address filtering • Do not auto-connect to open Wi-Fi Networks • Assign Static IP Addresses to Devices • Enable Firewalls On Each Computer and the Router • Position the Router or Access Point Safely • Turn Off the Network During Extended Periods of Non-Use
Conclusion • Risks are inherent in any wireless technology, but is still better than the wired technology • Security is most important, so use the best protection • WPA2 with AES is currently the most secure encryption method • Enable any additional security measures to secure your wireless network
references • http://compnetworking.about.com/cs/wireless/f/whatiswireless.htm • http://en.wikipedia.org/wiki/Wireless_security • http://en.wikipedia.org/wiki/Wireless_LAN_security#Security_options • http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access • http://windows.microsoft.com/en-US/windows-vista/What-are-the-different-wireless-network-security-methods • http://www.computer-encryption.com/2009/05/what-wifi-hackers-can-see-580.html