wireless security

14
Wireless Security Wireless Security Focus on Focus on Encryption Encryption Steps to secure a Wi-Fi Steps to secure a Wi-Fi Network Network

Upload: francesca-lucas

Post on 01-Jan-2016

27 views

Category:

Documents


2 download

DESCRIPTION

Wireless Security. Focus on Encryption Steps to secure a Wi-Fi Network. Wi-Fi at home. Using a broadband Internet connection and a single WAP wired and wireless clients can access each other and the internet - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless Security

Wireless SecurityWireless Security

Focus on Focus on EncryptionEncryption

Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network

Page 2: Wireless Security

Wi-Fi at homeWi-Fi at home

Using a broadband Internet connection and Using a broadband Internet connection and a single WAP wired and wireless clients can a single WAP wired and wireless clients can access each other and the internetaccess each other and the internet

non-computer devices can access the non-computer devices can access the wireless connectivity to other devices or the wireless connectivity to other devices or the Internet Internet

Page 3: Wireless Security

DisadvantagesDisadvantages

Easier to connect remotely (unwanted)Easier to connect remotely (unwanted) Encryption protocol can be brokenEncryption protocol can be broken Passwords can be forcibly hackedPasswords can be forcibly hacked

Page 4: Wireless Security

Tools to Protect a Wireless NetworkTools to Protect a Wireless Network

WPA/WEPWPA/WEP– Wi-fi Protected Access PointWi-fi Protected Access Point– Wired Equivalent ProtectionWired Equivalent Protection

Mac Address FilteringMac Address Filtering Assign Static IP AddressAssign Static IP Address Good positioning of the Wireless Access Good positioning of the Wireless Access

Point/ WAPPoint/ WAP

Page 5: Wireless Security

WAP/WEPWAP/WEP

Wired Equivalent Protection Wired Equivalent Protection – 64 Bit64 Bit– 128 Bit128 Bit– 256 Bit256 Bit

Increased SecurityDecreased Speed

Page 6: Wireless Security

Wired Equivalent ProtectionWired Equivalent Protection

24 bit send rate24 bit send rate Total Size is based on Send rate + Total Size is based on Send rate +

encryptionencryption 64 bits = 24 bit send + 40 bit key64 bits = 24 bit send + 40 bit key 128 bits = 24 bit send + 104 bit key128 bits = 24 bit send + 104 bit key 256 bits = 24 bit send + 232 bit key256 bits = 24 bit send + 232 bit key

– Approximately 58 hexadecimal digitsApproximately 58 hexadecimal digits

Page 7: Wireless Security

Wired Equivalent ProtectionWired Equivalent Protection

The larger the key the more intercepted The larger the key the more intercepted packets it would take to breakpackets it would take to break

Warning:Warning:– There are programs that can break these keysThere are programs that can break these keys– There are programs that create enough traffic of There are programs that create enough traffic of

packets to break even a 256 bit keypackets to break even a 256 bit key

Page 8: Wireless Security

Mac Address FilteringMac Address Filtering

All Wireless Cards have Mac addressAll Wireless Cards have Mac address Filters can be set to allow or disallow all Mac Filters can be set to allow or disallow all Mac

address listedaddress listed This mean certain computers can be This mean certain computers can be

blockedblocked Or only certain computers can connectOr only certain computers can connect

*Note hackers can make fake Mac address to *Note hackers can make fake Mac address to get onget on

Page 9: Wireless Security

Assign Static IP AddressAssign Static IP Address

Most users use DHCP technology which Most users use DHCP technology which allows the router to assign IP address allows the router to assign IP address automatically upon connectionautomatically upon connection

This allow hacker easy access with valid IP This allow hacker easy access with valid IP addressaddress

By Assigning Static IP address access is By Assigning Static IP address access is limited to only those valid IP addresslimited to only those valid IP address

Page 10: Wireless Security

Good positioning of the Wireless Good positioning of the Wireless Access Point/ WAPAccess Point/ WAP

Wi-Fi signals normally reach to the exterior Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" of a home. A small amount of "leakage" outdoors is not a problem, but the further outdoors is not a problem, but the further this signal reaches, the easier it is for others this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often to detect and exploit. Wi-Fi signals often reach through neighboring homes and into reach through neighboring homes and into streets streets

Page 11: Wireless Security

Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network

1)1) Change the default Administrator Change the default Administrator PassowrdsPassowrds

2)2) Turn on the Encryption ProtocolsTurn on the Encryption Protocols

3)3) Change the Default SSIDChange the Default SSID1)1) This is the Name that will be seen by wireless This is the Name that will be seen by wireless

devices. Default names tell intruders that the devices. Default names tell intruders that the newtork is being poorly managed and easier newtork is being poorly managed and easier to get intoto get into

Page 12: Wireless Security

Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network

4)4) Enable MAC Address Filtering, this will Enable MAC Address Filtering, this will force unwanted guest to use programs to force unwanted guest to use programs to create fake MAC address.create fake MAC address.

5)5) Disable SSID broadcastDisable SSID broadcast1)1) This is used to create hotspot where client This is used to create hotspot where client

come and go often. In a home there is usually come and go often. In a home there is usually a consistent amount of peoplea consistent amount of people

Page 13: Wireless Security

Steps to secure a Wi-Fi NetworkSteps to secure a Wi-Fi Network

6) Assign Static IP address to devices6) Assign Static IP address to devices

7) Enable Firewalls on Each computer and the 7) Enable Firewalls on Each computer and the RouterRouter

8) Good positioning of the WAP8) Good positioning of the WAP

9) Turn off the network during extended 9) Turn off the network during extended periods of not being usedperiods of not being used

Page 14: Wireless Security

Special Thanks TooSpecial Thanks Too

Google.comGoogle.com

About.comAbout.com

Wikipedia.comWikipedia.com