SlideShare a Scribd company logo
1 of 13
Unsecured Wireless Networks
Name: Ulysses Tyler
Instructor: Heather F. Willis, Ph.D.
Class: Arts and Science Capstone
Unsecured Wireless Networks
The Risks
• Everyday, wireless networks are setup around the world
• However, unsecure wireless networks can put users at risk
• As a result, unwanted guests can gain access to their
network and retrieve personal information.
• The loss and damage that may occur, can become
irrevocable (Ciampa, 2007)
Unsecured Wireless Networks
Intruders
• Wardrivers may be hackers who drive around your
neighborhood in a vehicle with a wireless detection device in
search of unsecured wireless networks (Barney, 2014)
• Hackers can then capture and see everything you do on your
computer as well as view personal information
• Your information can be compromised in varying ways
Unsecured Wireless Networks
Types of Stolen Information
• Users credit card information can be stolen and then sold or
used to purchase goods or services
• Hackers may also open up credit cards or bank accounts in
your name and use the cards or accounts without your
knowledge
• If your Social Security Number (SSN), bank account access
codes, or other pertinent or private information is stored on your
computer, it is subject to theft.
Unsecure Wireless Networks
Statistics
• A study done by Sophos in London, revealed 107,000 wireless networks were in use in
within a 91 mile radius. Some 27% of wireless networks had no encryption at all or
were Wired Equivalent Privacy (WEP) enabled (Barney, 2014)
• The WEP is the lowest form of protection that a user can have on their computer
• Below you will find a link to a video taken in 2006, which demonstrates how hijackers
can spy on what the user is doing (Esengulov, 2008)
https://www.youtube.com/watch?v=A88XB7_Jz7s
Unsecured Wireless Networks
Complicated Instructions
• Some users have expressed that they experience complications when
making efforts to set up a secure network.
• Understanding the complexity of the language used and the reading
of the small print was considered to be a challenge(Ciampa, 2007)
• I would like to suggest that manufacturers improved documentation
for the general public to utilize during the initial set-up period
Unsecured Wireless Networks
Targeted Audiences
Manufacturers
• First, I would target manufacturers to provide suggested
improved instructions for setting up wireless routers and
secure settings
End-users
• Once manufacturers are on board, I would then target the
end users with a campaign that will inform them regarding
the dangers of leaving their wireless connection unsecure
• Having improved instructions, users may be more apt to
follow the necessary steps to secure their devices
Unsecured Wireless Networks
Solutions
• Instructions should clearly instruct the user how to log-in to the router
• To protect yourself, follow the steps below to access the site where password
changes to your account can be made
• Prior to changing your password, you will need to login to the router’s username
and password screen.
Login instructions:
1. Connected to your unsecure router
2. Open your internet browser and enter this web
address “192.168.1.1”
3. Once the username and password box
appears, enter “admin” for both boxes
4. Click the OK button and your administrator
page will appear
Unsecured Wireless Networks
Changing Administrator Passwords
How to Change your Administrator Password
1. Select administrator tab at the top.
2. Delete router password and enter a new
password.
3. Confirm password and select save
• Any user can find the default administrator password of a wireless router by going
to the manufacturers website
• Be sure to change the your wireless router’s administrator password provided!
• Be sure to use a password that include letters, numbers, and special characters. It is
not advisable to use words that may be defined in a dictionary!
Unsecured Wireless Networks
Securing Wireless Network
Instructions for Securing Your Wireless
Network
1. To secure wireless network select wireless
tab
2. Select wireless security
3. Under security mode select WPA2
personal
4. Under shared key enter a strong password
5. Click save settings
Unsecured Wireless Networks
Additional Types of Instructions
• Settings such as Media Access Control (MAC)filtering, and
turning off Service Set Identifier (SSID), should also be explained
in a manner that novice beginners can understand.
• We all know that the instructions with the device covers this
information, but again, there should be instructions that a
beginner will understand
Conclusion
In conclusion, I hope that this PowerPoint will provide the
audience with the importance of securing devices and
understanding that doing so may keep out any unwanted guests.
Furthermore, focus should be placed on manufacturers to
develop improved instructions for beginners who are not familiar
with configuring wireless routers. Finally, a campaign should be
developed to assist the public with understanding dangers of
leaving their wireless internet unsecure.
References
• Barney, B. (2014, June 23). Warbiking: Hacking with Your Helmet On . Retrieved December 30, 2014, from
Security Metrics: http://blog.securitymetrics.com/2014/06/warbiking.html
• Brain, M., Wilson, T. V., & Johnson, B. (2013, april 13). How WiFi Works. Retrieved December 15, 2014, from
Howstuffworks: http://computer.howstuffworks.com/wireless-network.htm
• Ciampa, M. (2007). CWSP Guide to Wireless Security. Boston: Course Technology.
• Esengulov, A. (2008, December 04). How To Secure Your Wireless Network Connection. Retrieved
December 04, 2014, from Make us of: http://www.makeuseof.com/tag/secure-your-wireless-network-
here-is-why-and-how/
• Gann, R. (2012, December 06). How to secure a wireless network. Retrieved December 15, 2014, from
techradar: http://www.techradar.com/us/news/internet/how-to-secure-a-wireless-network-1075710#null
• hayward, J. (2012, June 11). How secure is your neighborhood? Retrieved December 30, 2014, from
Human Events: http://humanevents.com/2012/06/11/how-secure-is-your-neighborhood/
• Huang, P. (2012, July 16). Understanding IEEE 802.11ac VHT Wireless. Retrieved December 15, 2014, from
Electronicdesign: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-
wireless
• Strom, D. (2010, June 17). 6 Annoying Router Problems - And How to Fix Them. Retrieved December 15,
2014, from PC World:
http://www.pcworld.com/article/199130/6_Annoying_Router_Problems_And_How_to_Fix_Them.html
• Wawro, A. (2011, November 10). How To Lock Down Your Wireless Network. Retrieved December 15,
2014, from PC World:
http://www.pcworld.com/article/243290/how_to_lock_down_your_wireless_network.html

More Related Content

What's hot

Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internetMarni3Bridges
 
Wireless security toai vm
Wireless security toai vmWireless security toai vm
Wireless security toai vmKitaro Lee
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanZaibi Gondal
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpointcarlyxxjo55
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationRubal Sagwal
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cftoamma
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presencegueste0b5fe
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and FirewallShafeeqaFarsana
 

What's hot (20)

Tech savvy seniors week 3 term 4 intro to internet
Tech savvy seniors   week 3 term 4 intro to internetTech savvy seniors   week 3 term 4 intro to internet
Tech savvy seniors week 3 term 4 intro to internet
 
Wireless security toai vm
Wireless security toai vmWireless security toai vm
Wireless security toai vm
 
Network security
Network securityNetwork security
Network security
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Im260 computer hacking powerpoint
Im260  computer hacking powerpointIm260  computer hacking powerpoint
Im260 computer hacking powerpoint
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Chapter 4 2016
Chapter 4 2016Chapter 4 2016
Chapter 4 2016
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Cybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
 
Uc14 chap09
Uc14 chap09Uc14 chap09
Uc14 chap09
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
Presentation1 new (1) (1)cf
Presentation1 new (1) (1)cfPresentation1 new (1) (1)cf
Presentation1 new (1) (1)cf
 
Network security
Network security Network security
Network security
 
iTwin Technology
iTwin TechnologyiTwin Technology
iTwin Technology
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Anti Whaling Hardening Up Your Net Presence
Anti   Whaling   Hardening Up Your Net PresenceAnti   Whaling   Hardening Up Your Net Presence
Anti Whaling Hardening Up Your Net Presence
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
Network security
Network securityNetwork security
Network security
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 

Similar to Unsecured wireless networks final

Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
1) The Security wireless system is a Security technique which is use.pdf
1) The Security wireless system is a Security technique which is use.pdf1) The Security wireless system is a Security technique which is use.pdf
1) The Security wireless system is a Security technique which is use.pdfanithareadymade
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1KowsalyaS12
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityOlivia Moran
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security TipsPECB
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxAde John Gestole
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 

Similar to Unsecured wireless networks final (20)

Wireless security
Wireless securityWireless security
Wireless security
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
1) The Security wireless system is a Security technique which is use.pdf
1) The Security wireless system is a Security technique which is use.pdf1) The Security wireless system is a Security technique which is use.pdf
1) The Security wireless system is a Security technique which is use.pdf
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
Wireless security
Wireless securityWireless security
Wireless security
 
Complexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless SecurityComplexity Versus Comprehendability: Simplifying Wireless Security
Complexity Versus Comprehendability: Simplifying Wireless Security
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Network Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptxNetwork Security - Advanced Computer Network.pptx
Network Security - Advanced Computer Network.pptx
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
PACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless AttacksPACE-IT, Security+3.4: Summary of Wireless Attacks
PACE-IT, Security+3.4: Summary of Wireless Attacks
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 

Recently uploaded

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 

Recently uploaded (20)

Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 

Unsecured wireless networks final

  • 1. Unsecured Wireless Networks Name: Ulysses Tyler Instructor: Heather F. Willis, Ph.D. Class: Arts and Science Capstone
  • 2. Unsecured Wireless Networks The Risks • Everyday, wireless networks are setup around the world • However, unsecure wireless networks can put users at risk • As a result, unwanted guests can gain access to their network and retrieve personal information. • The loss and damage that may occur, can become irrevocable (Ciampa, 2007)
  • 3. Unsecured Wireless Networks Intruders • Wardrivers may be hackers who drive around your neighborhood in a vehicle with a wireless detection device in search of unsecured wireless networks (Barney, 2014) • Hackers can then capture and see everything you do on your computer as well as view personal information • Your information can be compromised in varying ways
  • 4. Unsecured Wireless Networks Types of Stolen Information • Users credit card information can be stolen and then sold or used to purchase goods or services • Hackers may also open up credit cards or bank accounts in your name and use the cards or accounts without your knowledge • If your Social Security Number (SSN), bank account access codes, or other pertinent or private information is stored on your computer, it is subject to theft.
  • 5. Unsecure Wireless Networks Statistics • A study done by Sophos in London, revealed 107,000 wireless networks were in use in within a 91 mile radius. Some 27% of wireless networks had no encryption at all or were Wired Equivalent Privacy (WEP) enabled (Barney, 2014) • The WEP is the lowest form of protection that a user can have on their computer • Below you will find a link to a video taken in 2006, which demonstrates how hijackers can spy on what the user is doing (Esengulov, 2008) https://www.youtube.com/watch?v=A88XB7_Jz7s
  • 6. Unsecured Wireless Networks Complicated Instructions • Some users have expressed that they experience complications when making efforts to set up a secure network. • Understanding the complexity of the language used and the reading of the small print was considered to be a challenge(Ciampa, 2007) • I would like to suggest that manufacturers improved documentation for the general public to utilize during the initial set-up period
  • 7. Unsecured Wireless Networks Targeted Audiences Manufacturers • First, I would target manufacturers to provide suggested improved instructions for setting up wireless routers and secure settings End-users • Once manufacturers are on board, I would then target the end users with a campaign that will inform them regarding the dangers of leaving their wireless connection unsecure • Having improved instructions, users may be more apt to follow the necessary steps to secure their devices
  • 8. Unsecured Wireless Networks Solutions • Instructions should clearly instruct the user how to log-in to the router • To protect yourself, follow the steps below to access the site where password changes to your account can be made • Prior to changing your password, you will need to login to the router’s username and password screen. Login instructions: 1. Connected to your unsecure router 2. Open your internet browser and enter this web address “192.168.1.1” 3. Once the username and password box appears, enter “admin” for both boxes 4. Click the OK button and your administrator page will appear
  • 9. Unsecured Wireless Networks Changing Administrator Passwords How to Change your Administrator Password 1. Select administrator tab at the top. 2. Delete router password and enter a new password. 3. Confirm password and select save • Any user can find the default administrator password of a wireless router by going to the manufacturers website • Be sure to change the your wireless router’s administrator password provided! • Be sure to use a password that include letters, numbers, and special characters. It is not advisable to use words that may be defined in a dictionary!
  • 10. Unsecured Wireless Networks Securing Wireless Network Instructions for Securing Your Wireless Network 1. To secure wireless network select wireless tab 2. Select wireless security 3. Under security mode select WPA2 personal 4. Under shared key enter a strong password 5. Click save settings
  • 11. Unsecured Wireless Networks Additional Types of Instructions • Settings such as Media Access Control (MAC)filtering, and turning off Service Set Identifier (SSID), should also be explained in a manner that novice beginners can understand. • We all know that the instructions with the device covers this information, but again, there should be instructions that a beginner will understand
  • 12. Conclusion In conclusion, I hope that this PowerPoint will provide the audience with the importance of securing devices and understanding that doing so may keep out any unwanted guests. Furthermore, focus should be placed on manufacturers to develop improved instructions for beginners who are not familiar with configuring wireless routers. Finally, a campaign should be developed to assist the public with understanding dangers of leaving their wireless internet unsecure.
  • 13. References • Barney, B. (2014, June 23). Warbiking: Hacking with Your Helmet On . Retrieved December 30, 2014, from Security Metrics: http://blog.securitymetrics.com/2014/06/warbiking.html • Brain, M., Wilson, T. V., & Johnson, B. (2013, april 13). How WiFi Works. Retrieved December 15, 2014, from Howstuffworks: http://computer.howstuffworks.com/wireless-network.htm • Ciampa, M. (2007). CWSP Guide to Wireless Security. Boston: Course Technology. • Esengulov, A. (2008, December 04). How To Secure Your Wireless Network Connection. Retrieved December 04, 2014, from Make us of: http://www.makeuseof.com/tag/secure-your-wireless-network- here-is-why-and-how/ • Gann, R. (2012, December 06). How to secure a wireless network. Retrieved December 15, 2014, from techradar: http://www.techradar.com/us/news/internet/how-to-secure-a-wireless-network-1075710#null • hayward, J. (2012, June 11). How secure is your neighborhood? Retrieved December 30, 2014, from Human Events: http://humanevents.com/2012/06/11/how-secure-is-your-neighborhood/ • Huang, P. (2012, July 16). Understanding IEEE 802.11ac VHT Wireless. Retrieved December 15, 2014, from Electronicdesign: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht- wireless • Strom, D. (2010, June 17). 6 Annoying Router Problems - And How to Fix Them. Retrieved December 15, 2014, from PC World: http://www.pcworld.com/article/199130/6_Annoying_Router_Problems_And_How_to_Fix_Them.html • Wawro, A. (2011, November 10). How To Lock Down Your Wireless Network. Retrieved December 15, 2014, from PC World: http://www.pcworld.com/article/243290/how_to_lock_down_your_wireless_network.html