This Slide share will help you understand WiFi security and how it works. Also, a few touch points on Network Segregation, Content Filtering, Password / Sharing Policies, etc.
2. History of Wireless Security
•WEP – Wired Equivalency Privacy
Can be broken easily.
•WPA – Wi-Fi Protected Access
Introduces TKIP – Temporal Key Integrity Protocol
•WPA2-PSK – Wi-Fi Protected Access 2 – Pre-Shared Key
Introduces AES - Advanced Encryption Standard
3. Public Wi-Fi Security
Risks
•Open / Unsecured Wi-Fi
•Automatic connecting of your device to open/unsecured Wi-Fi
•Is WPA2-PSK 100% secure?
No, user must be aware of HTTP vs HTTPS and take advantage
of VPNs.
•Types of attacks
Man in the middle
Sniffing
4. How to Stay Secure Over Any Connection
•Ask Management name of their Wi-Fi SSID – Service Set
Identifier
•HTTP vs HTTPS - Hyper Text Transfer Protocol Secure
•VPN – Virtual Private Network
Free and Paid
5. Network Segregation
•Why does it matter?
Separation of networks ensures no possible link between
subnets.
•Production user vs Guest user
•How a wireless user can infiltrate the production network
• What can they really see or access?
Possible to see IP and MAC addresses. Remote Desktop
possible if not secured.
•Hide your production network SSID
6. Content Filtering
•To Filter or Not to Filter?
Production users = Yes. Guest access = No.
•What to filter?
Many websites can hinder productivity of employees and bring
viruses into your workstations and some can even propagate to
other network-connected devices.
•How easy is it to implement?
Very! Necessary licenses can be purchased with proper hardware
in place.
7. Passwords and Sharing
Policies
•Secure your open network with a password
•Give guest network unrelated password to production
network
•Post signs with guest Wi-Fi SSID and password
8. Optimize Bandwidth
•Give Production users faster upload and download speeds
•Restrict speeds for guest users
•Have a completely separate internet service for guest users