wireless security
DESCRIPTION
Wireless Security. Focus on Encryption Steps to secure a Wi-Fi Network. Wi-Fi at home. Using a broadband Internet connection and a single WAP wired and wireless clients can access each other and the internet - PowerPoint PPT PresentationTRANSCRIPT
Wireless SecurityWireless Security
Focus on Focus on EncryptionEncryption
Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network
Wi-Fi at homeWi-Fi at home
Using a broadband Internet connection and Using a broadband Internet connection and a single WAP wired and wireless clients can a single WAP wired and wireless clients can access each other and the internetaccess each other and the internet
non-computer devices can access the non-computer devices can access the wireless connectivity to other devices or the wireless connectivity to other devices or the Internet Internet
DisadvantagesDisadvantages
Easier to connect remotely (unwanted)Easier to connect remotely (unwanted) Encryption protocol can be brokenEncryption protocol can be broken Passwords can be forcibly hackedPasswords can be forcibly hacked
Tools to Protect a Wireless NetworkTools to Protect a Wireless Network
WPA/WEPWPA/WEP– Wi-fi Protected Access PointWi-fi Protected Access Point– Wired Equivalent ProtectionWired Equivalent Protection
Mac Address FilteringMac Address Filtering Assign Static IP AddressAssign Static IP Address Good positioning of the Wireless Access Good positioning of the Wireless Access
Point/ WAPPoint/ WAP
WAP/WEPWAP/WEP
Wired Equivalent Protection Wired Equivalent Protection – 64 Bit64 Bit– 128 Bit128 Bit– 256 Bit256 Bit
Increased SecurityDecreased Speed
Wired Equivalent ProtectionWired Equivalent Protection
24 bit send rate24 bit send rate Total Size is based on Send rate + Total Size is based on Send rate +
encryptionencryption 64 bits = 24 bit send + 40 bit key64 bits = 24 bit send + 40 bit key 128 bits = 24 bit send + 104 bit key128 bits = 24 bit send + 104 bit key 256 bits = 24 bit send + 232 bit key256 bits = 24 bit send + 232 bit key
– Approximately 58 hexadecimal digitsApproximately 58 hexadecimal digits
Wired Equivalent ProtectionWired Equivalent Protection
The larger the key the more intercepted The larger the key the more intercepted packets it would take to breakpackets it would take to break
Warning:Warning:– There are programs that can break these keysThere are programs that can break these keys– There are programs that create enough traffic of There are programs that create enough traffic of
packets to break even a 256 bit keypackets to break even a 256 bit key
Mac Address FilteringMac Address Filtering
All Wireless Cards have Mac addressAll Wireless Cards have Mac address Filters can be set to allow or disallow all Mac Filters can be set to allow or disallow all Mac
address listedaddress listed This mean certain computers can be This mean certain computers can be
blockedblocked Or only certain computers can connectOr only certain computers can connect
*Note hackers can make fake Mac address to *Note hackers can make fake Mac address to get onget on
Assign Static IP AddressAssign Static IP Address
Most users use DHCP technology which Most users use DHCP technology which allows the router to assign IP address allows the router to assign IP address automatically upon connectionautomatically upon connection
This allow hacker easy access with valid IP This allow hacker easy access with valid IP addressaddress
By Assigning Static IP address access is By Assigning Static IP address access is limited to only those valid IP addresslimited to only those valid IP address
Good positioning of the Wireless Good positioning of the Wireless Access Point/ WAPAccess Point/ WAP
Wi-Fi signals normally reach to the exterior Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" of a home. A small amount of "leakage" outdoors is not a problem, but the further outdoors is not a problem, but the further this signal reaches, the easier it is for others this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often to detect and exploit. Wi-Fi signals often reach through neighboring homes and into reach through neighboring homes and into streets streets
Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network
1)1) Change the default Administrator Change the default Administrator PassowrdsPassowrds
2)2) Turn on the Encryption ProtocolsTurn on the Encryption Protocols
3)3) Change the Default SSIDChange the Default SSID1)1) This is the Name that will be seen by wireless This is the Name that will be seen by wireless
devices. Default names tell intruders that the devices. Default names tell intruders that the newtork is being poorly managed and easier newtork is being poorly managed and easier to get intoto get into
Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network
4)4) Enable MAC Address Filtering, this will Enable MAC Address Filtering, this will force unwanted guest to use programs to force unwanted guest to use programs to create fake MAC address.create fake MAC address.
5)5) Disable SSID broadcastDisable SSID broadcast1)1) This is used to create hotspot where client This is used to create hotspot where client
come and go often. In a home there is usually come and go often. In a home there is usually a consistent amount of peoplea consistent amount of people
Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network
6) Assign Static IP address to devices6) Assign Static IP address to devices
7) Enable Firewalls on Each computer and the 7) Enable Firewalls on Each computer and the RouterRouter
8) Good positioning of the WAP8) Good positioning of the WAP
9) Turn off the network during extended 9) Turn off the network during extended periods of not being usedperiods of not being used
Special Thanks TooSpecial Thanks Too
Google.comGoogle.com
About.comAbout.com
Wikipedia.comWikipedia.com