SlideShare a Scribd company logo
LAN’s
Victoria Davis
Joshua Sinyard
Julie Garbison
Quanina Young
Amanda Waite
Introduction to LAN’s
A LAN (Local Area Network) is a type of network that offers
connection of different personal devices that exist in a small
area. The devices can be configured to be hardwired or
wireless.
WEP, WPA, PSK, TKIP and AES are all wireless security
measures that can help protect the transmission of data over
a LAN. The differences between these five security protocols
is that they each provide a different level of security for a
network depending on the needs of the network owner (some
are better for the home, some better for business, etc.). These
security protocols are upgraded versions of each other that
are designed to fix vulnerabilities in the preceding protocol.
WEP – Wireless Equivalent Privacy
A security protocol used
by routers to that protects
data by encrypting packets
sent over the wireless
network.
WEP was used in the
event that unauthorized
users (or hackers) outside
of the wireless LAN
attempted to intercept the
data sent over network.
WEP was created to provide a
level of confidentiality similar
to that of the hard wired
network.
WEP’s are most used in homes
and is still a method of
network protection used by
routers.
WPA – Wi-Fi Protected Access
A solution to the flaws of the WEP
security protocol, used by routers.
WPA adds more protection than WEP
(which was the first wireless
protection) by providing more end to
end security (from the internet
access point to the receiver).
WPA was created to make sure that
the encryption key on the data
packets were not changed or
tampered with by unauthorized
users. The most recent version of
WPA is WPA2.
WPA eliminates a hacker’s ability to
change the encryption key without
the network knowing through
integrity checking cryptography that
ensures end to end security. Hashing
is also used to make it difficult to
determine what the algorithm
between the input data and the hash
value of that same data is. Key –
mixing and re-keying increase the
strength of the encryption and
change the key every 10,000 packets.
WPA can be used on home and
business networks.
WEP vs. WPA
TKIP – Temporal Key Integrity Protocol
A security protocol used by
routers that ensures that every
data packet sent over a wireless
LAN has a unique encryption
key, also known as key mixing.
TKIP was created as a solution to
the breaking of WEP which left a
wireless network without a viable
link-layer security. Key mixing
makes the decoding of keys more
difficult and eliminates the WEP
key recovery attacks.
• TKIP prevents hackers or
otherwise unauthorized users
of the network from obtaining
the personal passwords of
authorized network users.
TKIP can be used at home for
upgrading security on a wireless
network. TKIP is not ideal for the
protection of sensitive corporate
and government data
transmissions.
AES – Advanced Encryption Standard
One of the strongest cryptographic
algorithms, sometimes used by the
WPA2 security protocol. AES algorithms
work by rearranging and substituting the
data sent over a network.
AES was created by a division of the U.S.
Commerce Department as a replacement
for the Data Encryption Standard (also
known as DES). It is considered the
standard for encrypting unclassified
government information for decades to
come.
With AES, there is no known attack that
can decrypt without searching through
all 256bit keys, which would take a lot of
time and power. AES substitutes data
using different techniques such as Key
schedule, State, Sbox, and Cipher
Algorithm Pseudocode etc.
AES is used by businesses in which
maximum security is necessary
(government, financial and
telecommunications businesses, etc.).
TKIP vs. AES
PSK – Pre Shared Key
A wireless security feature in which a
pre shared key is selected by the
owner of the network and given out
only to individuals they authorize to
connect to the network. PSK is
normally 8-16 characters long and is
saved on the devices of authorized
users for easy access to the network.
PSK was created to protect network
owners from unwanted threats. PSK
also functions to allow home owners
or small business to share
information with coworkers, friends
and family.
PSK used where an individual has a
wireless network and only wants
certain authorized users to be able to
access it. The individual creates a
password, and only those who know
or are given the password can gain
access to the wireless network on
their devices.
PSK can be used on WLAN’s in the
home as well as by small business
networks.
PSK
LAN Configurations
Devices:
Cable modem
Computer A - PC (with ethernet NIC &without wifi NIC)
Computer B - File server
Xbox 360
Configuration 1 – The purchase of a wireless NIC for Computer A to create an
Ad Hoc network.
Configuration 2 – A hard-wired connection for all devices using Ethernet
cables and a router.
Configuration 3 – A hard-wired connection between the router and modem,
as well as between Computer A and the router. All other
devices connected wirelessly.
Configuration 1
Configuration 2
Configuration 3

More Related Content

What's hot

Wifi security
Wifi securityWifi security
Wifi security
Dooremoore
 
WEP
WEPWEP
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
Information Technology
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
Harshit Varshney
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
Mohammad Mahmud Kabir
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
Radhwan Al-Jaki
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
akki_hearts
 
Wpa3
Wpa3Wpa3
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
Suraj Bohara
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
n|u - The Open Security Community
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
SecurityTube.Net
 

What's hot (20)

Wifi security
Wifi securityWifi security
Wifi security
 
WEP
WEPWEP
WEP
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Ch06 Wireless Network Security
Ch06 Wireless Network SecurityCh06 Wireless Network Security
Ch06 Wireless Network Security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless security
Wireless securityWireless security
Wireless security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wlan networking and security
Wlan networking and securityWlan networking and security
Wlan networking and security
 
Wpa3
Wpa3Wpa3
Wpa3
 
WIFI Hacking
WIFI HackingWIFI Hacking
WIFI Hacking
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Wifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and DrinkWifi Security, or Descending into Depression and Drink
Wifi Security, or Descending into Depression and Drink
 

Similar to LAN's by Group 1

Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh
 
Week13
Week13Week13
Week13
s1180079
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
Septafiansyah P
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
Week13
Week13Week13
Week13
s1180079
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
Shashank Srivastava
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Chema Alonso
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
bhanu4ugood1
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
Lopamudra Das
 
Wireless security by mujajhid rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
Mujahid Rana
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
shrutisreddy
 
Security standard
Security standardSecurity standard
Security standard
lyndyv
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
BRNSSPublicationHubI
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
MD MONIRUZZAMAN
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
SubashiniRathinavel
 

Similar to LAN's by Group 1 (20)

Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Week13
Week13Week13
Week13
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Wireless hacking septafiansyah
Wireless hacking   septafiansyahWireless hacking   septafiansyah
Wireless hacking septafiansyah
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Week13
Week13Week13
Week13
 
Shashank wireless lans security
Shashank wireless lans securityShashank wireless lans security
Shashank wireless lans security
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Wi fi protected access
Wi fi protected accessWi fi protected access
Wi fi protected access
 
Wireless security by mujajhid rana
Wireless security by mujajhid ranaWireless security by mujajhid rana
Wireless security by mujajhid rana
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
Security standard
Security standardSecurity standard
Security standard
 
Wireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security SoftwareWireless Network Security Software Wireless Network Security Software
Wireless Network Security Software Wireless Network Security Software
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless lan security(10.8)
Wireless lan security(10.8)Wireless lan security(10.8)
Wireless lan security(10.8)
 

Recently uploaded

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 

Recently uploaded (20)

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 

LAN's by Group 1

  • 1. LAN’s Victoria Davis Joshua Sinyard Julie Garbison Quanina Young Amanda Waite
  • 2. Introduction to LAN’s A LAN (Local Area Network) is a type of network that offers connection of different personal devices that exist in a small area. The devices can be configured to be hardwired or wireless. WEP, WPA, PSK, TKIP and AES are all wireless security measures that can help protect the transmission of data over a LAN. The differences between these five security protocols is that they each provide a different level of security for a network depending on the needs of the network owner (some are better for the home, some better for business, etc.). These security protocols are upgraded versions of each other that are designed to fix vulnerabilities in the preceding protocol.
  • 3. WEP – Wireless Equivalent Privacy A security protocol used by routers to that protects data by encrypting packets sent over the wireless network. WEP was used in the event that unauthorized users (or hackers) outside of the wireless LAN attempted to intercept the data sent over network. WEP was created to provide a level of confidentiality similar to that of the hard wired network. WEP’s are most used in homes and is still a method of network protection used by routers.
  • 4. WPA – Wi-Fi Protected Access A solution to the flaws of the WEP security protocol, used by routers. WPA adds more protection than WEP (which was the first wireless protection) by providing more end to end security (from the internet access point to the receiver). WPA was created to make sure that the encryption key on the data packets were not changed or tampered with by unauthorized users. The most recent version of WPA is WPA2. WPA eliminates a hacker’s ability to change the encryption key without the network knowing through integrity checking cryptography that ensures end to end security. Hashing is also used to make it difficult to determine what the algorithm between the input data and the hash value of that same data is. Key – mixing and re-keying increase the strength of the encryption and change the key every 10,000 packets. WPA can be used on home and business networks.
  • 6. TKIP – Temporal Key Integrity Protocol A security protocol used by routers that ensures that every data packet sent over a wireless LAN has a unique encryption key, also known as key mixing. TKIP was created as a solution to the breaking of WEP which left a wireless network without a viable link-layer security. Key mixing makes the decoding of keys more difficult and eliminates the WEP key recovery attacks. • TKIP prevents hackers or otherwise unauthorized users of the network from obtaining the personal passwords of authorized network users. TKIP can be used at home for upgrading security on a wireless network. TKIP is not ideal for the protection of sensitive corporate and government data transmissions.
  • 7. AES – Advanced Encryption Standard One of the strongest cryptographic algorithms, sometimes used by the WPA2 security protocol. AES algorithms work by rearranging and substituting the data sent over a network. AES was created by a division of the U.S. Commerce Department as a replacement for the Data Encryption Standard (also known as DES). It is considered the standard for encrypting unclassified government information for decades to come. With AES, there is no known attack that can decrypt without searching through all 256bit keys, which would take a lot of time and power. AES substitutes data using different techniques such as Key schedule, State, Sbox, and Cipher Algorithm Pseudocode etc. AES is used by businesses in which maximum security is necessary (government, financial and telecommunications businesses, etc.).
  • 9. PSK – Pre Shared Key A wireless security feature in which a pre shared key is selected by the owner of the network and given out only to individuals they authorize to connect to the network. PSK is normally 8-16 characters long and is saved on the devices of authorized users for easy access to the network. PSK was created to protect network owners from unwanted threats. PSK also functions to allow home owners or small business to share information with coworkers, friends and family. PSK used where an individual has a wireless network and only wants certain authorized users to be able to access it. The individual creates a password, and only those who know or are given the password can gain access to the wireless network on their devices. PSK can be used on WLAN’s in the home as well as by small business networks.
  • 10. PSK
  • 11. LAN Configurations Devices: Cable modem Computer A - PC (with ethernet NIC &without wifi NIC) Computer B - File server Xbox 360 Configuration 1 – The purchase of a wireless NIC for Computer A to create an Ad Hoc network. Configuration 2 – A hard-wired connection for all devices using Ethernet cables and a router. Configuration 3 – A hard-wired connection between the router and modem, as well as between Computer A and the router. All other devices connected wirelessly.