SlideShare a Scribd company logo
THE TECHNICAL INFORMATION
The Wireless Security
Network Improvement
• Security system Assessment
• Periodically Regulation Security checking
• Customer security system assessment
The Background
Before
The WiFi Security to access network device (only)
use the Password Access (WPA2)
Analysis
Effect :
the client not authorized
accessing the network
The system using single protection is possible to “leakage” the password.
* The sample list of device connected to WiFi
Analysis
Effect
Increasing the internet traffic and
decreasing internet speed
The system using single protection is possible to “leakage” the password.
* The Internet accessing traffic
The Kaizen
The WiFi Security to access network
device using :
1. Password Access (WPA2)
2. Wireless MAC filtering
The Effect
1. Only authorized client can be accessing the Wireless LAN
2. Optimizing the internet speed and internet traffic for client

More Related Content

What's hot

firewall
firewallfirewall
firewall
Chirag Patel
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
NCS Computech Ltd.
 
Firewall PPT
Firewall PPTFirewall PPT
Firewall PPT
Mytec1
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
NCS Computech Ltd.
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
ManageEngine, Zoho Corporation
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
Patten John
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
RanjithKumar428
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
Lan & Wan Solutions
 
Security Measure to Protect Web Server
Security Measure to Protect Web ServerSecurity Measure to Protect Web Server
Security Measure to Protect Web Server
Nameen Singh
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
Felipe Prado
 
Wi fi
Wi fiWi fi
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
Gyana Ranjana
 
Firewall
FirewallFirewall
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
Nguyen Binh
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
MOHIT AGARWAL
 
Vpn
VpnVpn
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
Lan & Wan Solutions
 

What's hot (20)

firewall
firewallfirewall
firewall
 
LAN Security
LAN Security LAN Security
LAN Security
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Firewall PPT
Firewall PPTFirewall PPT
Firewall PPT
 
OwnYIT CSAT + SIEM
OwnYIT CSAT + SIEMOwnYIT CSAT + SIEM
OwnYIT CSAT + SIEM
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
 
160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture160415 lan and-wan-secure-access-architecture
160415 lan and-wan-secure-access-architecture
 
Security Measure to Protect Web Server
Security Measure to Protect Web ServerSecurity Measure to Protect Web Server
Security Measure to Protect Web Server
 
DEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellamDEF CON 23 - vivek ramachadran - chellam
DEF CON 23 - vivek ramachadran - chellam
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Firewall
FirewallFirewall
Firewall
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Firewalls and packet filters
Firewalls and packet filtersFirewalls and packet filters
Firewalls and packet filters
 
Vpn
VpnVpn
Vpn
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 

Similar to Improvement WiFi Security Network Access

Wifi
WifiWifi
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
Tushar Anand
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
cmstiernberg
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
lez31palka
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
cmstiernberg
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Schneider Electric
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
Atika Zaimi
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
Purushottam Naidu
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
Virendra Thakur
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
Hishan Shouketh
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
802 11 3
802 11 3802 11 3
802 11 3
rphelps
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
DCPS
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
AuliaArifWardana
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
al-sari7
 

Similar to Improvement WiFi Security Network Access (20)

Wifi
WifiWifi
Wifi
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Wireless security using wpa2
Wireless security using wpa2Wireless security using wpa2
Wireless security using wpa2
 
Wireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring ApplicationsWireless Security Best Practices for Remote Monitoring Applications
Wireless Security Best Practices for Remote Monitoring Applications
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
 
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...Understanding IT Network Security for Wireless and Wired Measurement Applicat...
Understanding IT Network Security for Wireless and Wired Measurement Applicat...
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Wi fi security
Wi fi securityWi fi security
Wi fi security
 
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
All  about Firewalls ,IPS IDS and the era of UTM in a nutshellAll  about Firewalls ,IPS IDS and the era of UTM in a nutshell
All about Firewalls ,IPS IDS and the era of UTM in a nutshell
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
802 11 3
802 11 3802 11 3
802 11 3
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
CompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four ReviewCompTIA Security+ Chapter Four Review
CompTIA Security+ Chapter Four Review
 
IoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentationIoT-Device-Security-DRAFT-slide-presentation
IoT-Device-Security-DRAFT-slide-presentation
 
4 wifi security
4 wifi security4 wifi security
4 wifi security
 

More from Ahmad Firdaus

Hyper-V Disaster Recovery Optimizing
Hyper-V Disaster Recovery OptimizingHyper-V Disaster Recovery Optimizing
Hyper-V Disaster Recovery Optimizing
Ahmad Firdaus
 
NIS_Kaizen
NIS_KaizenNIS_Kaizen
NIS_Kaizen
Ahmad Firdaus
 
Optimized_HD_Kaizen_Jan15
Optimized_HD_Kaizen_Jan15Optimized_HD_Kaizen_Jan15
Optimized_HD_Kaizen_Jan15
Ahmad Firdaus
 
MIS_May15_Project
MIS_May15_ProjectMIS_May15_Project
MIS_May15_Project
Ahmad Firdaus
 
Kaizen_Dec14
Kaizen_Dec14Kaizen_Dec14
Kaizen_Dec14
Ahmad Firdaus
 
Kaizen_Mar15
Kaizen_Mar15Kaizen_Mar15
Kaizen_Mar15
Ahmad Firdaus
 
Upgrade The Backup System
Upgrade The Backup SystemUpgrade The Backup System
Upgrade The Backup System
Ahmad Firdaus
 
NID Main Apps with Failover
NID Main Apps with FailoverNID Main Apps with Failover
NID Main Apps with Failover
Ahmad Firdaus
 

More from Ahmad Firdaus (8)

Hyper-V Disaster Recovery Optimizing
Hyper-V Disaster Recovery OptimizingHyper-V Disaster Recovery Optimizing
Hyper-V Disaster Recovery Optimizing
 
NIS_Kaizen
NIS_KaizenNIS_Kaizen
NIS_Kaizen
 
Optimized_HD_Kaizen_Jan15
Optimized_HD_Kaizen_Jan15Optimized_HD_Kaizen_Jan15
Optimized_HD_Kaizen_Jan15
 
MIS_May15_Project
MIS_May15_ProjectMIS_May15_Project
MIS_May15_Project
 
Kaizen_Dec14
Kaizen_Dec14Kaizen_Dec14
Kaizen_Dec14
 
Kaizen_Mar15
Kaizen_Mar15Kaizen_Mar15
Kaizen_Mar15
 
Upgrade The Backup System
Upgrade The Backup SystemUpgrade The Backup System
Upgrade The Backup System
 
NID Main Apps with Failover
NID Main Apps with FailoverNID Main Apps with Failover
NID Main Apps with Failover
 

Improvement WiFi Security Network Access

  • 1. THE TECHNICAL INFORMATION The Wireless Security Network Improvement
  • 2. • Security system Assessment • Periodically Regulation Security checking • Customer security system assessment The Background
  • 3. Before The WiFi Security to access network device (only) use the Password Access (WPA2)
  • 4. Analysis Effect : the client not authorized accessing the network The system using single protection is possible to “leakage” the password. * The sample list of device connected to WiFi
  • 5. Analysis Effect Increasing the internet traffic and decreasing internet speed The system using single protection is possible to “leakage” the password. * The Internet accessing traffic
  • 6. The Kaizen The WiFi Security to access network device using : 1. Password Access (WPA2) 2. Wireless MAC filtering
  • 7. The Effect 1. Only authorized client can be accessing the Wireless LAN 2. Optimizing the internet speed and internet traffic for client