SlideShare a Scribd company logo
1 of 19
MUJAHID RANA
Bs IT 6th semester
Roll No 1173008
Presentation Topic : wireless security
TOPICS
 Introduction to wireless
 Wireless security
 Issues
 WEP security (Wired Equivalent Privacy)
 WAP security (Wi-Fi Protected Access)
 How we secure the home wireless network
I N T RO D U C T I O N T O W I R L E S S N E T WO R K S
 Wireless networks are computer networks that are not connected
by cables
 Medium is Air
 Less Cost
 Wireless devices work in Bluetooth, printer LAN, MAN, WAN
 No need dial up phone , space , wire
WIRELESS SECURITY
 Wireless technology has become very popular in recent years,
The convenience of wireless networks has changed how people use computers,
TV's and video games, but it has also created new security concerns and challenges.
 Wireless radio frequency signals broadcast through the open air, making your
network visible to anyone using a wireless capable device within range. Without
security on your network, it is open to anyone who can "see" your network.
 If someone you don't know is using your connection, they could be using it to
download content that is illegal (such as music or movies).
SECURITY ISSUES
 End user are not security experts, and may not be aware of the risks
posed by wireless LANs
 Nearly all of the access points running with default configuration have
not activated WEP
 Most of the users does not change access points' default key used by
all the vendor’s products Like user (admin) pasw (admin)
 The Wireless Access Points who are enable with WEP can be cracked
easily
WEP SECURITY
 Wired Equivalent Privacy (or Wireless Encryption Protocol), WEP is part of the
IEEE 802.11 wireless
 WEP is used at the two lowest layers of the OSI model - the data link and
physical layers; it therefore does not offer end-to-end security.
 WEP's major weakness is its use of static encryption keys
 When you set up a router with a WEP encryption key, that one key is used by
every device on your network to encrypt every packet that's transmitted
 Do not secure as a long time easily crack wep security
allow to create 4 static keys
WPA SECURITY
 Improved data encryption through the temporal key integrity protocol (TKIP).
TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-
checking feature, ensures that the keys haven't been tampered
 WPA major advantage is its use of dynamic encryption keys
 If a device is not configured for WPA, it will usually fall back to the lesser WEP
encryption scheme
 User authentication, which is generally missing in WEP, through the extensible
authentication protocol (EAP). WEP regulates access to a wireless network based
on a computer's hardware-specific MAC address
HOW WE SECURE THE
HOME WIRELESS NETWORK
 Select the wireless security method of either WEP or WPA (we
suggest WPA
 Enter the passphrase to generate the keys. After enabling security
on the router, any wireless device that wants to connect must have the
key in order to connect to your network.
CHANGE DEFAULT ROUTER
PASSWORD
 Make sure the router password is not still set to the default
password.
 If the password can be guessed this could give someone access to
the router setup, which could allow them to change your router
settings, including viewing any security keys.
 The most of the device user and password is admin
D I S A B L E S S I D B ROA D C A S T
 To help make finding your wireless network easier wireless
routers broadcast your SSID, which means anyone looking for a
wireless router could see your SSID.
 To help make it more difficult for someone to find your network when
browsing for a wireless network you can disable the
 SSID broadcast feature. However, when disabling the SSID broadcast
it will require that you manually enter your unique SSID when wanting
to connect any new device to your network.
E N A B L E W I R E L E S S M AC F I LT E R
 The Wireless MAC filter feature only allows a wireless device to
connect to your router if the MAC Address has been entered into
the filter list.
 This can make connecting new devices to your network more
difficult, but improves the overall security of your wireless
network.
CHANGE THE SSID NAME
AND PASSWORD
 Change the SSID (Service Set Identifier ) Name Because it
Uniquely identify the Network
 Like PTCL devices all the devices default name is PTCL-PP
 Change the default key which help to protect your network I am
prefer to also make time
 The default password 12345678
Wireless security by mujajhid rana

More Related Content

What's hot

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 

What's hot (20)

Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)Hacking Wireless Networks : Null Delhi (November)
Hacking Wireless Networks : Null Delhi (November)
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture802.11 Wireless, WEP, WPA lecture
802.11 Wireless, WEP, WPA lecture
 
Hacking wireless networks
Hacking wireless networksHacking wireless networks
Hacking wireless networks
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
 
WiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless RouterWiFi Hotspot-Wireless Router
WiFi Hotspot-Wireless Router
 
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
 
Firewall
FirewallFirewall
Firewall
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Learn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private NetworkLearn How to Create a Secure IoT Private Network
Learn How to Create a Secure IoT Private Network
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi fi Technology
Wi fi TechnologyWi fi Technology
Wi fi Technology
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Unit 5 presentation
Unit 5   presentationUnit 5   presentation
Unit 5 presentation
 
Wireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by VijayWireless and WLAN Secuirty, Presented by Vijay
Wireless and WLAN Secuirty, Presented by Vijay
 

Viewers also liked (9)

Rj prezentace rlb - kreativa
Rj prezentace rlb - kreativaRj prezentace rlb - kreativa
Rj prezentace rlb - kreativa
 
PPC-Work
PPC-WorkPPC-Work
PPC-Work
 
A mediter
A mediterA mediter
A mediter
 
Himne
HimneHimne
Himne
 
Размещение наружной рекламы в городах, принимающих ЕВРО-2012. Украина
Размещение наружной рекламы в городах, принимающих ЕВРО-2012. УкраинаРазмещение наружной рекламы в городах, принимающих ЕВРО-2012. Украина
Размещение наружной рекламы в городах, принимающих ЕВРО-2012. Украина
 
Audit 2
Audit 2 Audit 2
Audit 2
 
Downloaded document
Downloaded documentDownloaded document
Downloaded document
 
Киев. Результаты Концепции развития наружной рекламы
Киев. Результаты Концепции развития наружной рекламыКиев. Результаты Концепции развития наружной рекламы
Киев. Результаты Концепции развития наружной рекламы
 
Great Inspiring Leader - Sir Richard Branson
Great Inspiring Leader - Sir Richard BransonGreat Inspiring Leader - Sir Richard Branson
Great Inspiring Leader - Sir Richard Branson
 

Similar to Wireless security by mujajhid rana

Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
Alf Tero
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 

Similar to Wireless security by mujajhid rana (20)

Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)Overview of WLAN security functions (ENG)
Overview of WLAN security functions (ENG)
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wireless security
Wireless securityWireless security
Wireless security
 
Module 6 Wireless Network security
Module 6  Wireless Network securityModule 6  Wireless Network security
Module 6 Wireless Network security
 
wireless networking
wireless networkingwireless networking
wireless networking
 
Wireless hacking tools.jpeg
Wireless hacking tools.jpegWireless hacking tools.jpeg
Wireless hacking tools.jpeg
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
 
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSISSECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
SECURING IEEE 802.11G WLAN USING OPENVPN AND ITS IMPACT ANALYSIS
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 

Wireless security by mujajhid rana

  • 1.
  • 2. MUJAHID RANA Bs IT 6th semester Roll No 1173008 Presentation Topic : wireless security
  • 3. TOPICS  Introduction to wireless  Wireless security  Issues  WEP security (Wired Equivalent Privacy)  WAP security (Wi-Fi Protected Access)  How we secure the home wireless network
  • 4. I N T RO D U C T I O N T O W I R L E S S N E T WO R K S  Wireless networks are computer networks that are not connected by cables  Medium is Air  Less Cost  Wireless devices work in Bluetooth, printer LAN, MAN, WAN  No need dial up phone , space , wire
  • 5. WIRELESS SECURITY  Wireless technology has become very popular in recent years, The convenience of wireless networks has changed how people use computers, TV's and video games, but it has also created new security concerns and challenges.  Wireless radio frequency signals broadcast through the open air, making your network visible to anyone using a wireless capable device within range. Without security on your network, it is open to anyone who can "see" your network.  If someone you don't know is using your connection, they could be using it to download content that is illegal (such as music or movies).
  • 6. SECURITY ISSUES  End user are not security experts, and may not be aware of the risks posed by wireless LANs  Nearly all of the access points running with default configuration have not activated WEP  Most of the users does not change access points' default key used by all the vendor’s products Like user (admin) pasw (admin)  The Wireless Access Points who are enable with WEP can be cracked easily
  • 7. WEP SECURITY  Wired Equivalent Privacy (or Wireless Encryption Protocol), WEP is part of the IEEE 802.11 wireless  WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end-to-end security.  WEP's major weakness is its use of static encryption keys  When you set up a router with a WEP encryption key, that one key is used by every device on your network to encrypt every packet that's transmitted  Do not secure as a long time easily crack wep security
  • 8. allow to create 4 static keys
  • 9. WPA SECURITY  Improved data encryption through the temporal key integrity protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity- checking feature, ensures that the keys haven't been tampered  WPA major advantage is its use of dynamic encryption keys  If a device is not configured for WPA, it will usually fall back to the lesser WEP encryption scheme  User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer's hardware-specific MAC address
  • 10.
  • 11. HOW WE SECURE THE HOME WIRELESS NETWORK  Select the wireless security method of either WEP or WPA (we suggest WPA  Enter the passphrase to generate the keys. After enabling security on the router, any wireless device that wants to connect must have the key in order to connect to your network.
  • 12. CHANGE DEFAULT ROUTER PASSWORD  Make sure the router password is not still set to the default password.  If the password can be guessed this could give someone access to the router setup, which could allow them to change your router settings, including viewing any security keys.  The most of the device user and password is admin
  • 13.
  • 14. D I S A B L E S S I D B ROA D C A S T  To help make finding your wireless network easier wireless routers broadcast your SSID, which means anyone looking for a wireless router could see your SSID.  To help make it more difficult for someone to find your network when browsing for a wireless network you can disable the  SSID broadcast feature. However, when disabling the SSID broadcast it will require that you manually enter your unique SSID when wanting to connect any new device to your network.
  • 15.
  • 16. E N A B L E W I R E L E S S M AC F I LT E R  The Wireless MAC filter feature only allows a wireless device to connect to your router if the MAC Address has been entered into the filter list.  This can make connecting new devices to your network more difficult, but improves the overall security of your wireless network.
  • 17.
  • 18. CHANGE THE SSID NAME AND PASSWORD  Change the SSID (Service Set Identifier ) Name Because it Uniquely identify the Network  Like PTCL devices all the devices default name is PTCL-PP  Change the default key which help to protect your network I am prefer to also make time  The default password 12345678