1 / 24

Simple ways to secure Wireless Computers

Simple ways to secure Wireless Computers. Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI. Questions. How many of you have more than one computer at home? How do you connect to the Internet (DSL, cable, dialup)? How many already have a home router?

rod
Download Presentation

Simple ways to secure Wireless Computers

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI

  2. Questions • How many of you have more than one computer at home? • How do you connect to the Internet (DSL, cable, dialup)? • How many already have a home router? • Already have a wireless router?

  3. Agenda • What is a Home network • Connecting things together • Firewalls and Filtering • Setting up a home router • Setting up Print and File Sharing • Questions

  4. Home Network • One or more computers connected: • To the Internet with a router • To each other in order to share Resources: • Internet Connections • Sharing Files • Sharing Printers

  5. What is a Router • Connects one network to another • Sometimes called a “Gateway” • In our case it connects to your cable modem or DSL Line • Routers keep track of IP addresses and physical (MAC) addresses of hosts • Managed (As we shall see)

  6. What is a Cable/DSL Modem • Usually provided and controlled by your ISP • Connects your home to the Internet. • This is the device that gets your public IP address • Normally has no firewall protection • Make sure you use the right cable

  7. What is a Firewall • A device the filters packets or traffic • Its job is to be a traffic cop • You configure the firewall: • What will allow to pass • What will it block • Hides your home network from the outside world • Can be either in hardware or software

  8. Internet Firewall Home Network Firewall Protection • Implement a firewall (checks incoming traffic at the network before it gets to your home network) Default – Blocks all Incoming connections • Leaving you home network default is allow all outbound connections • Hardware firewalls protect you home network by stop all traffic before it get to your computers • Personal software firewall on your computer blocks incoming and outgoing (lets you know what is leaving your computer)

  9. Firewall Routers The idea is layers of protection • Examples of home combo units include • Dlink • Netgear • Linksys

  10. Software Firewalls • Add additional protection by: • Controlling what leaves your computer • Adding a second level of protection • By being aware of application level attacks • By allow you to schedule • Usage of the internet by time (control access at night) • By location (block content for young children)

  11. Software Firewalls for Home Use • McAfee Firewall • Symantec’s Norton Personal Firewall • Zone Alarm (Free) • Computer Associates with Firewall (free) • Windows Firewall in XP Service Pack 2 (free)

  12. Wireless • What is wireless • Wireless Networking Standards • 802.11 a, b, and g • Recommend a standard “g” model • Wireless Security Standards • Recommend Wired Equivalent Privacy (WEP) • Wi-Fi Protected Access (WPA)

  13. Wireless Network Standards

  14. Lesson: Introduction to Securing Wireless Networks • What are the benefits of wireless networks? • Common threats to wireless security • Wireless network standards • Guidelines for using security to mitigate risks to wireless networks • Wireless network architecture

  15. What Are the Benefits of Wireless Networks? Business benefits: • Mobile users moving between offices save time andeffort with a transparent connection to the corporate network • Users can use e-mail, electronic calendars, and chat technologies when away from their desks Operational benefits: • The cost of provisioning network access to buildings is substantially lowered • The network can be easily scaled to respond to different levels of demand when the organization changes

  16. Common Threats to Wireless Security • Eavesdropping • Spoofing • Interception and modification of transmitted data • Freeloading • Denial of service • Rogue WLANs

  17. Guidelines for Using Security to Mitigate Risks to Wireless Networks Require data encryption for all wireless communications Require 802.1x authentication to help prevent spoofing, freeloading, and accidental threats to your network If you allow unauthenticated access to your wireless network, require a VPN connection to access the corporate network Specify the use of software scanning tools to locate and shut down rogue WLANs on your corporate network

  18. Wireless Network Architecture ESS IBSS BSS STA STA AP DS AP BSS STA STA

  19. Demo: Wireless Devices Clearsight Scanner

  20. Demo: How to configure Wireless Firewall/router • Example: • Basic Settings • Wireless Settings • Backup Settings • Set Account name and password • Blocking and Filtering

  21. Steps to protect your wireless network • Change the default password on your router • 2. Enable WEP on router and wireless workstation • Use MAC address filtering • SSID broadcast of • Prohibit Peer-to-peer (Ad Hoc) networking • 5. Keep current on hardware bios upgrades

  22. Demo: Rogue Wireless Devices AirSnare

  23. Weak Passwords Your computer password is the foundation of your computer security No Password = No Security Old Passwords & Same Password = Little Security Change the “administrator” password on your computer

  24. Questions WWW.MIR.NET FOR COPIES OF THIS DECK

More Related