2. Unsecured Wireless Networks
The Risks
• Everyday, wireless networks are setup around the world
• However, unsecure wireless networks can put users at risk
• As a result, unwanted guests can gain access to their
network and retrieve personal information.
• The loss and damage that may occur, can become
irrevocable (Ciampa, 2007)
3. Unsecured Wireless Networks
Intruders
• Wardrivers may be hackers who drive around your
neighborhood in a vehicle with a wireless detection device in
search of unsecured wireless networks (Barney, 2014)
• Hackers can then capture and see everything you do on your
computer as well as view personal information
• Your information can be compromised in varying ways
4. Unsecured Wireless Networks
Types of Stolen Information
• Users credit card information can be stolen and then sold or
used to purchase goods or services
• Hackers may also open up credit cards or bank accounts in
your name and use the cards or accounts without your
knowledge
• If your Social Security Number (SSN), bank account access
codes, or other pertinent or private information is stored on your
computer, it is subject to theft.
5. Unsecure Wireless Networks
Statistics
• A study done by Sophos in London, revealed 107,000 wireless networks were in use in
within a 91 mile radius. Some 27% of wireless networks had no encryption at all or
were Wired Equivalent Privacy (WEP) enabled (Barney, 2014)
• The WEP is the lowest form of protection that a user can have on their computer
• Below you will find a link to a video taken in 2006, which demonstrates how hijackers
can spy on what the user is doing (Esengulov, 2008)
https://www.youtube.com/watch?v=A88XB7_Jz7s
6. Unsecured Wireless Networks
Complicated Instructions
• Some users have expressed that they experience complications when
making efforts to set up a secure network.
• Understanding the complexity of the language used and the reading
of the small print was considered to be a challenge(Ciampa, 2007)
• I would like to suggest that manufacturers improved documentation
for the general public to utilize during the initial set-up period
7. Unsecured Wireless Networks
Targeted Audiences
Manufacturers
• First, I would target manufacturers to provide suggested
improved instructions for setting up wireless routers and
secure settings
End-users
• Once manufacturers are on board, I would then target the
end users with a campaign that will inform them regarding
the dangers of leaving their wireless connection unsecure
• Having improved instructions, users may be more apt to
follow the necessary steps to secure their devices
8. Unsecured Wireless Networks
Solutions
• Instructions should clearly instruct the user how to log-in to the router
• To protect yourself, follow the steps below to access the site where password
changes to your account can be made
• Prior to changing your password, you will need to login to the router’s username
and password screen.
Login instructions:
1. Connected to your unsecure router
2. Open your internet browser and enter this web
address “192.168.1.1”
3. Once the username and password box
appears, enter “admin” for both boxes
4. Click the OK button and your administrator
page will appear
9. Unsecured Wireless Networks
Changing Administrator Passwords
How to Change your Administrator Password
1. Select administrator tab at the top.
2. Delete router password and enter a new
password.
3. Confirm password and select save
• Any user can find the default administrator password of a wireless router by going
to the manufacturers website
• Be sure to change the your wireless router’s administrator password provided!
• Be sure to use a password that include letters, numbers, and special characters. It is
not advisable to use words that may be defined in a dictionary!
10. Unsecured Wireless Networks
Securing Wireless Network
Instructions for Securing Your Wireless
Network
1. To secure wireless network select wireless
tab
2. Select wireless security
3. Under security mode select WPA2
personal
4. Under shared key enter a strong password
5. Click save settings
11. Unsecured Wireless Networks
Additional Types of Instructions
• Settings such as Media Access Control (MAC)filtering, and
turning off Service Set Identifier (SSID), should also be explained
in a manner that novice beginners can understand.
• We all know that the instructions with the device covers this
information, but again, there should be instructions that a
beginner will understand
12. Conclusion
In conclusion, I hope that this PowerPoint will provide the
audience with the importance of securing devices and
understanding that doing so may keep out any unwanted guests.
Furthermore, focus should be placed on manufacturers to
develop improved instructions for beginners who are not familiar
with configuring wireless routers. Finally, a campaign should be
developed to assist the public with understanding dangers of
leaving their wireless internet unsecure.
13. References
• Barney, B. (2014, June 23). Warbiking: Hacking with Your Helmet On . Retrieved December 30, 2014, from
Security Metrics: http://blog.securitymetrics.com/2014/06/warbiking.html
• Brain, M., Wilson, T. V., & Johnson, B. (2013, april 13). How WiFi Works. Retrieved December 15, 2014, from
Howstuffworks: http://computer.howstuffworks.com/wireless-network.htm
• Ciampa, M. (2007). CWSP Guide to Wireless Security. Boston: Course Technology.
• Esengulov, A. (2008, December 04). How To Secure Your Wireless Network Connection. Retrieved
December 04, 2014, from Make us of: http://www.makeuseof.com/tag/secure-your-wireless-network-
here-is-why-and-how/
• Gann, R. (2012, December 06). How to secure a wireless network. Retrieved December 15, 2014, from
techradar: http://www.techradar.com/us/news/internet/how-to-secure-a-wireless-network-1075710#null
• hayward, J. (2012, June 11). How secure is your neighborhood? Retrieved December 30, 2014, from
Human Events: http://humanevents.com/2012/06/11/how-secure-is-your-neighborhood/
• Huang, P. (2012, July 16). Understanding IEEE 802.11ac VHT Wireless. Retrieved December 15, 2014, from
Electronicdesign: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-
wireless
• Strom, D. (2010, June 17). 6 Annoying Router Problems - And How to Fix Them. Retrieved December 15,
2014, from PC World:
http://www.pcworld.com/article/199130/6_Annoying_Router_Problems_And_How_to_Fix_Them.html
• Wawro, A. (2011, November 10). How To Lock Down Your Wireless Network. Retrieved December 15,
2014, from PC World:
http://www.pcworld.com/article/243290/how_to_lock_down_your_wireless_network.html