1 / 10

Wireless Network Security

Wireless Network Security. By Simon Langford. About…. This oral presentation is on wireless networks and the methods of security in use on them, in order to prevent un-authorized access to the network.

rod
Download Presentation

Wireless Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Network Security By Simon Langford

  2. About… This oral presentation is on wireless networks and the methods of security in use on them, in order to prevent un-authorized access to the network. A wireless network is a medium to allow communication between computers using radio waves instead of fixed/hardwired cabling. Wireless networks have recently been the subject of intense scrutiny in regards to the security of them, we often hear stories about hackers gaining entry to wireless networks that are secured and stealing bandwidth and data. During this presentation I intend to investigate the methods of security for wireless networks and how safe they really are.

  3. Securing your wireless network • There are several steps you can take to secure your wireless network. These include the use of data encryption systems and an element of security by obscurity. • There are three main types of data encryption available on 802.11 standard wireless networks. These are: • - WEP – Wired Equivalent Privacy • WPA – WiFi (Wireless Fidelity) Protected Access • WPA2 – WiFi (Wireless Fidelity) Protected Access version 2 • WEP was the original encryption algorithm used on wireless networks, and is partially responsible for the reputation wireless networks have for being insecure. It uses a pre-shared key, however because of several design short falls, it is easy to break as the keys used for it are too short, and they are duplicated in static form on every packet encrypted with it sent across the network.

  4. Securing your wireless network - continued WPA and WPA2 are built on the basics of WEP, however are much more secure. They use longer keys and do not leave parts of packets unencrypted like WEP. WPA and WPA2 offer several different methods of authentication onto a network, such as the use of radius servers for commercial environments and pre-shared keys for home and small office networks.

  5. Security by obscurity In all good network designs, both wired and wireless, an element of security by obscurity should be used. These methods should not be used as stand alone security methods, but should be used in conjunction with a safe and strong encryption system such as WPA or WPA2. -MAC Address filtering on access points – allows only specified MAC addresses access to the network -Hiding the SSID (name) of the network – makes clients need to specify the name of the network, eg “Flinders”, “ASMS” etc. -Positioning your equipment so that the networks signal is available only in areas that you want it and are safe – prevent outsiders from obtaining a useable signal for access to the network -Changing default passwords on equipment – do not keep default usernames and passwords for network equipment, if an unauthorized user gains access to your network, they could potentially tamper with your networks setup.

  6. Social Impacts of Vulnerable Wireless Networks Open and un-secure wireless networks can be very dangerous for their owners as they are potentially opening themselves up for everyone to see and in a sense inviting hackers to connect to the network. Once a hacker connects to an open network they can, depending on the structure of the network, access files and folders of the owners; often containing personal and confidential material or steal internet bandwidth. As well as the potential ramifications of confidential files getting into the wrong hands, Internet bandwidth theft is also a very serious matter. If someone else you do not know uses your connection for illegal activity and they are tracked, then you could potentially be blamed and linked by your account to that activity.

  7. Can wireless networks be secure? Wireless networks can be safe providing some effort is put into their implementation. An encryption algorithm must be used at an absolute minimum and you can take additional steps outlined on the previous page to ensure further network safety. Any network that has had some effort put into its setup will be 99% safe from even the most determined hackers. Most hackers/snoopers tend to go for the easy targets, that is the un-encrypted networks, and most often the objective of their efforts is only to use your internet connection!

  8. How widely in use are wireless networks? Wireless networks are becoming very widely in use across Adelaide. Below is an image compiled by Geordie Millar and myself of individual wireless networks stumbled from September to December last year. Map of Adelaide and surrounding areas. Generated by wigle.net

  9. Sources The realm of accumulated knowledge and real world experience of Simon Langford Map of wireless networks from wigle.net. Constructed from data uploaded by Geordie Millar and Simon Langford Consultation with self proclaimed WiFi expert Geordie Millar on the workings of WEP and WPA.

  10. Ok, So Wireless Networks can be secure, but are they safe? http://www.wellingtongrey.net/miscellanea/archive/2007-05-27--the-truth-about-wireless-devices.html Shock! Horror! Wireless routers emit radiation!

More Related