SlideShare a Scribd company logo
Securing Your Home Wireless Network Last Updated: 03/16/2015
Router IP Address Username Password
3Com 192.168.1.1 n/a admin
Apple 192.168.1.1 admin admin
Asus 192.168.1.1 admin admin
Belkin 192.168.2.1 admin n/a
Dell 192.168.1.1 n/a admin
Linksys 192.168.0.1 admin admin
Medialink 192.168.0.1 n/a admin
Motorola 192.168.100.1 admin motorola
Netgear 192.18.0.1 admin password
TP-LINK 192.168.1.1 admin admin
US Robotic 192.168.1.1 admin admin
Securing Your Home Wireless Network - Do’s and Don’ts
Glossary of Commonly Used Terms
Access Your Router
Creating a Unique SSID Disabling the SSID Broadcast
Change the Username and Password
•	 When creating passwords for your networks devices, ensure that they are sufficiently long and complex by using uppercase letters, lowercase letters,
numbers, and symbols. Consider a multi-word phrase that does not consist of dictionary-based words. An example of a satisfactorily long and complex
password would be ILuvF00tb@77 from the phrase “I love football.”
•	 Use a cable to directly access the internet for any computers that remain stationary.
•	 Turn off your wireless network when you will not be using it for an extended period of time.
•	 If you have guest access set up for your network, ensure that it is password protected.
•	 If possible, turn on automatic updates for your network device’s firmware. If automatic updates are not offered, periodically check for firmware
updates on the network devices’ websites and manually download and install them.
•	 If your router is compromised or if you cannot remember the password, you can restore it to the default factory settings by pressing the reset button
located on the back of the router.
•	 Position the router away from windows and further into the interior of your house to decrease the exterior reach of the signal.
To access your router, you must enter the appropriate IP address, username, and password. Most routers share similar log-in information.
Wireless Router - Physical hardware that allows users to connect their devices to a shared internet network.
Service Set Identifier (SSID) - The public name of a wireless network.
Wired Equivalent Privacy (WEP) - Older security algorithm for wireless networks that has numerous security flaws.
Wi-Fi Protected Access (WPA) - More recent security algorithm for wireless networks. Also has many security flaws.
Wi-Fi Protected Access II (WPAZ) - The most secure algorithm for wireless networks. Improved upon and replaced WPA.
Pre-shared key (PSK) - An authentication mechanism that mandates a password. Adds additional security to wireless networks.
Hypetext Transfer Protocol (HTTP) - Protocol for communication over a computer network.
Hypertext Transfer Protocol Secure (HTTPS) - Uses various encryption protocols to add additional security to HTTP.
Media Access Control (MAC) Address - A unique, individual identifier assigned to computers and devices.
Choose a username that does not include you or your family’s names and a
password that is long and complex.
Choose a SSID that does
not include you or your
family’s names or physical
address.
This prevents the SSID from being listed under avaiable Wi-Fi networks,
thereby requirng users to know and enter the SSID before connecting to the
network.
Practically Networked
Wi-Fi.org
NIST
www.practicallynetworked.com/support/wireless_secure.htm
www.wi-fi.org/discover-wi-fi/security
http://csrc.nist.gov/publications/nistpubs/800-48-rev1/SP800-48r1.pdf
Useful Links - For more information or questions regarding this card email smartcards@novetta.com
Securing Your Home Wireless Network Last Updated: 03/16/2015
Router Firewall
Remote Access
Wireless MAC filtering
Enabling HTTPS Limiting Administrative Access
Encryption
Check that the Remote Management IP Address is set to 0.0.0.0 to ensure
that remote access is disabled.
Restrict administrative access through the web to specific devices. Add the
MAC addresses for each computer and device you wish to have
administrative access.
Between the optional WEP, WPA, WPA-PSK, WP2, and WPA2-PSK algorithms, you should select WPA2-PSK and also AES for encryption. The PSK password
should be long and complex, but different than the administrative router access password.
Enable MAC address filtering to ensure that only approved computers and
devices can connect to your router.
Enable the router’s firewall protection to limit the router’s vulnerability to
virsuses and cyber attacks.
Enable access via HTTPS to add additional security.

More Related Content

What's hot

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
cdunk12
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
ABHAY PATHAK
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
ABHAY PATHAK
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
Jay Nagar
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
vjom
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
spyware
spywarespyware
spyware
NamanKikani
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
ITNet
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
Nicola Cadenelli
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
Viral Parmar
 
Spyware
SpywareSpyware
Spyware
Avani Patel
 
Computer virus
Computer virusComputer virus
Computer virus
sajeena81
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
Emil Tan
 

What's hot (20)

User's Guide to Online Privacy
User's Guide to Online PrivacyUser's Guide to Online Privacy
User's Guide to Online Privacy
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Netiquette
NetiquetteNetiquette
Netiquette
 
spyware
spywarespyware
spyware
 
Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02Ia 124 1621324160 ia_124_lecture_02
Ia 124 1621324160 ia_124_lecture_02
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Smartphones' Security
Smartphones' SecuritySmartphones' Security
Smartphones' Security
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Mozilla - Let's take back the web
Mozilla - Let's take back the webMozilla - Let's take back the web
Mozilla - Let's take back the web
 
Spyware
SpywareSpyware
Spyware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Securing Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber WorldSecuring Mobile & Online Identity in the Cyber World
Securing Mobile & Online Identity in the Cyber World
 

Similar to Securing home wifi 16 mar15

10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
PECB
 
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
BILLYSALAMERO2
 
5 steps
5 steps5 steps
5 steps
Rozell Sneede
 
Wireless security
Wireless securityWireless security
Wireless security
paripec
 
Managing Security Issues with a Remote Workforce while Continuing to Grow You...
Managing Security Issues with a Remote Workforce while Continuing to Grow You...Managing Security Issues with a Remote Workforce while Continuing to Grow You...
Managing Security Issues with a Remote Workforce while Continuing to Grow You...
Aggregage
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
clcewing
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Wi fi
Wi fiWi fi
Wi fi
kendre1234
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian AnquillanoIECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
Kristian Anquillano
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
picklesvalery
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
Aerohive Networks
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
Joshua Sibaja
 
8 ways security_wireless
8 ways security_wireless8 ways security_wireless
8 ways security_wireless
SMC Networks Europe
 
Wi Fi
Wi FiWi Fi
What is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol CommunicationsWhat is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol Communications
Unisol Communications Pvt.Ltd.
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
IRJET Journal
 

Similar to Securing home wifi 16 mar15 (20)

10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Wireless security
Wireless securityWireless security
Wireless security
 
COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
 
5 steps
5 steps5 steps
5 steps
 
Wireless security
Wireless securityWireless security
Wireless security
 
Managing Security Issues with a Remote Workforce while Continuing to Grow You...
Managing Security Issues with a Remote Workforce while Continuing to Grow You...Managing Security Issues with a Remote Workforce while Continuing to Grow You...
Managing Security Issues with a Remote Workforce while Continuing to Grow You...
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wi fi
Wi fiWi fi
Wi fi
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian AnquillanoIECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
IECEP AGM 2018: Wireless Mesh Technology by Kristian Anquillano
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 
Aerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch Router
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
8 ways security_wireless
8 ways security_wireless8 ways security_wireless
8 ways security_wireless
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
What is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol CommunicationsWhat is the procedure for setting up a wireless network | Unisol Communications
What is the procedure for setting up a wireless network | Unisol Communications
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
 

More from Naval OPSEC

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
Naval OPSEC
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
Naval OPSEC
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
Naval OPSEC
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
Naval OPSEC
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
Naval OPSEC
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
Naval OPSEC
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
Naval OPSEC
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
Naval OPSEC
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
Naval OPSEC
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
Naval OPSEC
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
Naval OPSEC
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
Naval OPSEC
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
Naval OPSEC
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
Naval OPSEC
 
Phishing
PhishingPhishing
Phishing
Naval OPSEC
 
Opsec Heart Breaker
Opsec Heart BreakerOpsec Heart Breaker
Opsec Heart BreakerNaval OPSEC
 
Trash as Treasure
Trash as TreasureTrash as Treasure
Trash as TreasureNaval OPSEC
 
Don't Get Blindsided
Don't Get BlindsidedDon't Get Blindsided
Don't Get Blindsided
Naval OPSEC
 

More from Naval OPSEC (20)

Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14Smartphone exif removal 30 jul14
Smartphone exif removal 30 jul14
 
Photo sharing services 10 mar15
Photo sharing services 10 mar15Photo sharing services 10 mar15
Photo sharing services 10 mar15
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
Facebook mobile 11mar15
Facebook mobile 11mar15Facebook mobile 11mar15
Facebook mobile 11mar15
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)Opsec & sns for distro (no vid)
Opsec & sns for distro (no vid)
 
FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015FB Privacy Settings Jan 2015
FB Privacy Settings Jan 2015
 
Phishing
PhishingPhishing
Phishing
 
Opsec SNS
Opsec SNSOpsec SNS
Opsec SNS
 
Opsec Heart Breaker
Opsec Heart BreakerOpsec Heart Breaker
Opsec Heart Breaker
 
Trash as Treasure
Trash as TreasureTrash as Treasure
Trash as Treasure
 
Don't Get Blindsided
Don't Get BlindsidedDon't Get Blindsided
Don't Get Blindsided
 

Recently uploaded

Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 

Recently uploaded (20)

Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 

Securing home wifi 16 mar15

  • 1. Securing Your Home Wireless Network Last Updated: 03/16/2015 Router IP Address Username Password 3Com 192.168.1.1 n/a admin Apple 192.168.1.1 admin admin Asus 192.168.1.1 admin admin Belkin 192.168.2.1 admin n/a Dell 192.168.1.1 n/a admin Linksys 192.168.0.1 admin admin Medialink 192.168.0.1 n/a admin Motorola 192.168.100.1 admin motorola Netgear 192.18.0.1 admin password TP-LINK 192.168.1.1 admin admin US Robotic 192.168.1.1 admin admin Securing Your Home Wireless Network - Do’s and Don’ts Glossary of Commonly Used Terms Access Your Router Creating a Unique SSID Disabling the SSID Broadcast Change the Username and Password • When creating passwords for your networks devices, ensure that they are sufficiently long and complex by using uppercase letters, lowercase letters, numbers, and symbols. Consider a multi-word phrase that does not consist of dictionary-based words. An example of a satisfactorily long and complex password would be ILuvF00tb@77 from the phrase “I love football.” • Use a cable to directly access the internet for any computers that remain stationary. • Turn off your wireless network when you will not be using it for an extended period of time. • If you have guest access set up for your network, ensure that it is password protected. • If possible, turn on automatic updates for your network device’s firmware. If automatic updates are not offered, periodically check for firmware updates on the network devices’ websites and manually download and install them. • If your router is compromised or if you cannot remember the password, you can restore it to the default factory settings by pressing the reset button located on the back of the router. • Position the router away from windows and further into the interior of your house to decrease the exterior reach of the signal. To access your router, you must enter the appropriate IP address, username, and password. Most routers share similar log-in information. Wireless Router - Physical hardware that allows users to connect their devices to a shared internet network. Service Set Identifier (SSID) - The public name of a wireless network. Wired Equivalent Privacy (WEP) - Older security algorithm for wireless networks that has numerous security flaws. Wi-Fi Protected Access (WPA) - More recent security algorithm for wireless networks. Also has many security flaws. Wi-Fi Protected Access II (WPAZ) - The most secure algorithm for wireless networks. Improved upon and replaced WPA. Pre-shared key (PSK) - An authentication mechanism that mandates a password. Adds additional security to wireless networks. Hypetext Transfer Protocol (HTTP) - Protocol for communication over a computer network. Hypertext Transfer Protocol Secure (HTTPS) - Uses various encryption protocols to add additional security to HTTP. Media Access Control (MAC) Address - A unique, individual identifier assigned to computers and devices. Choose a username that does not include you or your family’s names and a password that is long and complex. Choose a SSID that does not include you or your family’s names or physical address. This prevents the SSID from being listed under avaiable Wi-Fi networks, thereby requirng users to know and enter the SSID before connecting to the network.
  • 2. Practically Networked Wi-Fi.org NIST www.practicallynetworked.com/support/wireless_secure.htm www.wi-fi.org/discover-wi-fi/security http://csrc.nist.gov/publications/nistpubs/800-48-rev1/SP800-48r1.pdf Useful Links - For more information or questions regarding this card email smartcards@novetta.com Securing Your Home Wireless Network Last Updated: 03/16/2015 Router Firewall Remote Access Wireless MAC filtering Enabling HTTPS Limiting Administrative Access Encryption Check that the Remote Management IP Address is set to 0.0.0.0 to ensure that remote access is disabled. Restrict administrative access through the web to specific devices. Add the MAC addresses for each computer and device you wish to have administrative access. Between the optional WEP, WPA, WPA-PSK, WP2, and WPA2-PSK algorithms, you should select WPA2-PSK and also AES for encryption. The PSK password should be long and complex, but different than the administrative router access password. Enable MAC address filtering to ensure that only approved computers and devices can connect to your router. Enable the router’s firewall protection to limit the router’s vulnerability to virsuses and cyber attacks. Enable access via HTTPS to add additional security.