SlideShare a Scribd company logo
1 of 17
Download to read offline
Wireless
Security
Presenter: Vi Minh Toai
Email: minhtoai@yahoo.com
CCNA, MCSE, CEH, F5 Advance
Contents
 Wireless Overview
 Wireless Security Risks
 Enhance Wireless Security
 Wireless diagram for finance organization
2
I. Wireless Overview
 More convenience than wired LAN
 Easy to connect, easy to share
 High Transport Speed. 802.11ac standard can archive
maximum 1,69 Gbit/s
 Most technology devices support WLAN
(802.11a/b/g/n/ac): computer, phone, tablet, camera,
printer, television, memory stick,…
 Municipal wireless network: some cities have coverage
wireless such as Bangkok, Singapore, Ha long, Hoi an,
Da nang, Hue
3
II. Wireless security risk
 Weak encryption WEP
 MIM - Man in the middle
 Easy bridge to wired LAN
 Rouge AP, evil twin,…
 Untrusted providers: Firmware, Embedded
wireless chip on Housewares such as clothes iron,
water heater,…
4
III. Enhance Wireless Security
1. Create a Wireless Security Policy
2. Secure the WLAN
3. Protect Your Company from Outside Threats
4. Security Awareness Training
5
1. Create a Wireless Security Policy
 Acceptable use policy
 E-mail and communications activities
 Antivirus policy
 Identity policy
 Password policy
 Encryption policy
 Remote access policy
6
2. Secure the WLAN
 Use strong encryption: WPA, WPA2
 Change the default SSID, default administrator
account/ password.
 Use VLANs or MAC address control lists
 Disable SSID broadcast
 Guest access SSID
 AP Isolation
 Secure management ports
 Secure communications
 Physical secure Access points
 Limit Wireless range
 Turn off Wireless when not use
 Regularly changing encryption keys
7
3. Protect Your Company from Outside
Threats
 802.1X authentication: RADIUS
 Assign Static IP
 Network Firewall and personal firewall software
 VPN: Virtual Private Network
 NAC: Network Access Control
 Wireless IPS: Prevent unauthorized, rogue AP, evil
twin and other wireless threats
 Wireless Security Endpoints: BYOD
 Wireless Management System
 Logging
8
4. Wireless Security Awareness Training
 Train users for using wireless securely.
 Understand Wireless Security Policy and follow
the policy.
 Do Not Auto-Connect to Open Wi-Fi Networks
9
IV. Wireless diagram for finance
organization
 Requirements:
 Wireless used for customers and VIP employees,
especially for HO and meeting rooms.
 Highest security, prevent any wireless threats.
10
Wireless diagram for finance organization
 Diagram 1
11
Wireless diagram for finance organization
 Diagram 2
12
Comparison
Method Diagram 1:
Advantage
Diagram 1:
Disadvantage
Diagram 2:
Advantage
Diagram 2:
Disadvantage
Design Equip Firewall,
private Internet line
for Branches
No need to equip
private Internet
line for Branches
Performance Fast Internet
access, low
delay
Slow Internet
access, high delay,
can effect WAN
connection
Security Secure Internal
LAN, Internet
access cannot
go inside
Passthough WAN
Infrastructure, hard
to control security
Availability Keep access
Internet as if
WAN line lost
Cannot access
Internet if WAN
line lost
Operation Hard operation as
must control
separate Internet
line of branches
Easy to control
because of
central Internet
management at
HO
13
Which diagram is the best for your
company?
 It depends on what you need.
 If Wireless is deployed for several branches,
diagram 1 should be the best.
 If Wireless is deployed for huge branches, diagram
2 should be considered.
14
Wireless Solution Providers
 Airtight
 Cisco
 Aruba
 Ruckus
 Juniper
 Meraki
 HP
15
References
 http://www.cisco.com/web/solutions/smb/need_to/
five_ways_to_improve_your_wireless_security.ht
ml
 http://compnetworking.about.com/od/wirelesssecu
rity/tp/wifisecurity.htm
16
Questions and Answers
 Please contact:
minhtoai@yahoo.com
THANK YOU! 
17

More Related Content

What's hot

Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 

What's hot (20)

Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 

Viewers also liked (7)

Wireless Abc
Wireless AbcWireless Abc
Wireless Abc
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Classification 10
Classification 10Classification 10
Classification 10
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 

Similar to Wireless security toai vm

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
Eyad Manna
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
CARMEN ALCIVAR
 

Similar to Wireless security toai vm (20)

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Wireless security toai vm

  • 1. Wireless Security Presenter: Vi Minh Toai Email: minhtoai@yahoo.com CCNA, MCSE, CEH, F5 Advance
  • 2. Contents  Wireless Overview  Wireless Security Risks  Enhance Wireless Security  Wireless diagram for finance organization 2
  • 3. I. Wireless Overview  More convenience than wired LAN  Easy to connect, easy to share  High Transport Speed. 802.11ac standard can archive maximum 1,69 Gbit/s  Most technology devices support WLAN (802.11a/b/g/n/ac): computer, phone, tablet, camera, printer, television, memory stick,…  Municipal wireless network: some cities have coverage wireless such as Bangkok, Singapore, Ha long, Hoi an, Da nang, Hue 3
  • 4. II. Wireless security risk  Weak encryption WEP  MIM - Man in the middle  Easy bridge to wired LAN  Rouge AP, evil twin,…  Untrusted providers: Firmware, Embedded wireless chip on Housewares such as clothes iron, water heater,… 4
  • 5. III. Enhance Wireless Security 1. Create a Wireless Security Policy 2. Secure the WLAN 3. Protect Your Company from Outside Threats 4. Security Awareness Training 5
  • 6. 1. Create a Wireless Security Policy  Acceptable use policy  E-mail and communications activities  Antivirus policy  Identity policy  Password policy  Encryption policy  Remote access policy 6
  • 7. 2. Secure the WLAN  Use strong encryption: WPA, WPA2  Change the default SSID, default administrator account/ password.  Use VLANs or MAC address control lists  Disable SSID broadcast  Guest access SSID  AP Isolation  Secure management ports  Secure communications  Physical secure Access points  Limit Wireless range  Turn off Wireless when not use  Regularly changing encryption keys 7
  • 8. 3. Protect Your Company from Outside Threats  802.1X authentication: RADIUS  Assign Static IP  Network Firewall and personal firewall software  VPN: Virtual Private Network  NAC: Network Access Control  Wireless IPS: Prevent unauthorized, rogue AP, evil twin and other wireless threats  Wireless Security Endpoints: BYOD  Wireless Management System  Logging 8
  • 9. 4. Wireless Security Awareness Training  Train users for using wireless securely.  Understand Wireless Security Policy and follow the policy.  Do Not Auto-Connect to Open Wi-Fi Networks 9
  • 10. IV. Wireless diagram for finance organization  Requirements:  Wireless used for customers and VIP employees, especially for HO and meeting rooms.  Highest security, prevent any wireless threats. 10
  • 11. Wireless diagram for finance organization  Diagram 1 11
  • 12. Wireless diagram for finance organization  Diagram 2 12
  • 13. Comparison Method Diagram 1: Advantage Diagram 1: Disadvantage Diagram 2: Advantage Diagram 2: Disadvantage Design Equip Firewall, private Internet line for Branches No need to equip private Internet line for Branches Performance Fast Internet access, low delay Slow Internet access, high delay, can effect WAN connection Security Secure Internal LAN, Internet access cannot go inside Passthough WAN Infrastructure, hard to control security Availability Keep access Internet as if WAN line lost Cannot access Internet if WAN line lost Operation Hard operation as must control separate Internet line of branches Easy to control because of central Internet management at HO 13
  • 14. Which diagram is the best for your company?  It depends on what you need.  If Wireless is deployed for several branches, diagram 1 should be the best.  If Wireless is deployed for huge branches, diagram 2 should be considered. 14
  • 15. Wireless Solution Providers  Airtight  Cisco  Aruba  Ruckus  Juniper  Meraki  HP 15
  • 17. Questions and Answers  Please contact: minhtoai@yahoo.com THANK YOU!  17