SlideShare a Scribd company logo
By: Todd M. Lowdermilk




                         1
Course participants will be able to
correctly list and describe a minimum of
eighth of the ten principals of home
network security without the use of any
supplemental documentation.




                                           2
COAX                 Cable Modem
Line In                              WiFi Signal
                       Ethernet                    NAS
                        Cable

                                        Ethernet
                 Router / Firewall
                                         Cable
          Ethernet
           Cable
                                                           Camera




    Computer             Computer      Laptop       XBox


                                                                    3
1.   Position the Router or Access Point
     Safely
2.   Change the default SSID (network name)
3.   Change default usernames and
     passwords
4.   Disable SSID Broadcast
5.   Turn on (Compatible) WPA / WEP
     Encryption


                                              4
6.  Enable MAC Address Filtering
7. Do Not Auto-Connect to Open Wi-Fi
    Networks
8. Assign Static IP Addresses to Devices
9. Enable Firewalls On Each Computer and
    the Router
10. Turn Off the Network During Extended
    Periods of Non-Use


                                           5
It is important to note that some of these security measures
may not be possible due to limitations such as the
availability of cable and power connections in relation to the
position of the router or access point. Also, I’m not an avid
fan of turning my router off when I’m away for extended
periods of time or disabling SSID broadcast as they are
simply inconvenient.
However, if you implement even just a handful of these
security principals you can drastically lessen the chances
of your network being compromised.
Title Slide Image by:
Goehring, David (CarbonNYC), 2008, Flickr from Yahoo.
   Accessed 28 Feb. 2012.
   http://www.flickr.com/photos/carbonnyc/2294144289/
                                                                 6

More Related Content

What's hot

How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
guest85e156e
 
How To Set Up A Wireless Network
How To Set Up A Wireless NetworkHow To Set Up A Wireless Network
How To Set Up A Wireless Network
2in1
 

What's hot (20)

Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireless Security Thesis Topics
Wireless Security Thesis TopicsWireless Security Thesis Topics
Wireless Security Thesis Topics
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Random key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networksRandom key material distribution in wireless sensor networks
Random key material distribution in wireless sensor networks
 
Ccnax
CcnaxCcnax
Ccnax
 
Hack wireless internet connections or wifi
Hack wireless internet connections or wifiHack wireless internet connections or wifi
Hack wireless internet connections or wifi
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Presentation
PresentationPresentation
Presentation
 
Digital self defense
Digital self defenseDigital self defense
Digital self defense
 
Firewalls
FirewallsFirewalls
Firewalls
 
How To Set Up A Wireless Network
How To Set Up A Wireless NetworkHow To Set Up A Wireless Network
How To Set Up A Wireless Network
 
Security issues
Security issuesSecurity issues
Security issues
 
52
5252
52
 
Firewall
Firewall Firewall
Firewall
 

Viewers also liked

Ordenado power point
Ordenado power pointOrdenado power point
Ordenado power point
Looye
 
Impresion
ImpresionImpresion
Impresion
Looye
 
Ejemplo aplica zoom
Ejemplo aplica zoomEjemplo aplica zoom
Ejemplo aplica zoom
Looye
 
Cafe presentation
Cafe presentationCafe presentation
Cafe presentation
Dinene Wolf
 
Practica 26
Practica 26Practica 26
Practica 26
Looye
 
Food web mini lesson
Food web mini lessonFood web mini lesson
Food web mini lesson
adr5179
 
Indian health care industry
Indian health care industryIndian health care industry
Indian health care industry
Sujith Surendran
 

Viewers also liked (17)

Ordenado power point
Ordenado power pointOrdenado power point
Ordenado power point
 
Charity in the City 2011
Charity in the City 2011Charity in the City 2011
Charity in the City 2011
 
One piece volume 2 - capitulo 017
One piece volume 2 - capitulo 017One piece volume 2 - capitulo 017
One piece volume 2 - capitulo 017
 
Impresion
ImpresionImpresion
Impresion
 
Ejemplo aplica zoom
Ejemplo aplica zoomEjemplo aplica zoom
Ejemplo aplica zoom
 
Cafe presentation
Cafe presentationCafe presentation
Cafe presentation
 
Practica 26
Practica 26Practica 26
Practica 26
 
A
AA
A
 
75 años viviendo la pedagogía del amor
75 años viviendo la pedagogía del amor75 años viviendo la pedagogía del amor
75 años viviendo la pedagogía del amor
 
One Piece - Volume 3 - Capítulo 022
One Piece - Volume 3 - Capítulo 022One Piece - Volume 3 - Capítulo 022
One Piece - Volume 3 - Capítulo 022
 
Presentacion sintesis
Presentacion sintesisPresentacion sintesis
Presentacion sintesis
 
One Piece - Volume 3 - Capitulo 026
One Piece - Volume 3 - Capitulo 026One Piece - Volume 3 - Capitulo 026
One Piece - Volume 3 - Capitulo 026
 
Food web mini lesson
Food web mini lessonFood web mini lesson
Food web mini lesson
 
Pcc religion 2013
Pcc religion 2013Pcc religion 2013
Pcc religion 2013
 
ООО "Экопосуда Намасте" - экопосуда и экопакеты из Индии
ООО "Экопосуда Намасте" - экопосуда и экопакеты из ИндииООО "Экопосуда Намасте" - экопосуда и экопакеты из Индии
ООО "Экопосуда Намасте" - экопосуда и экопакеты из Индии
 
Indian health care industry
Indian health care industryIndian health care industry
Indian health care industry
 
Difteria
DifteriaDifteria
Difteria
 

Similar to Unit 5 presentation

Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
Yogesh Kumar
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
Mihir Shah
 

Similar to Unit 5 presentation (20)

COT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptxCOT1- SETTING UP WIRELES AB NETWORK.pptx
COT1- SETTING UP WIRELES AB NETWORK.pptx
 
Wi-Fi
Wi-FiWi-Fi
Wi-Fi
 
Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018Wifi cracking Step by Step Using CMD and Kali Linux 2018
Wifi cracking Step by Step Using CMD and Kali Linux 2018
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
WIFI Technology
WIFI TechnologyWIFI Technology
WIFI Technology
 
The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005The Wireless Library Palinet Spring2005
The Wireless Library Palinet Spring2005
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
 
Wireless Router: This is how it Benefits
Wireless Router: This is how it BenefitsWireless Router: This is how it Benefits
Wireless Router: This is how it Benefits
 
Multi-mode Wireless SoCs
Multi-mode Wireless SoCsMulti-mode Wireless SoCs
Multi-mode Wireless SoCs
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 5 Exam Answers
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Wi fi
Wi fiWi fi
Wi fi
 

Recently uploaded

Recently uploaded (6)

What Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptxWhat Is The Psychology Behind Reborn Dolls_.pptx
What Is The Psychology Behind Reborn Dolls_.pptx
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..Welcomer Meeting to achieve the target ..
Welcomer Meeting to achieve the target ..
 
Youth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdfYouth Empowerment - Supporting the Next Generation of Changemakers.pdf
Youth Empowerment - Supporting the Next Generation of Changemakers.pdf
 
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
BECOMING A VEGETARIAN- Animal Cruelty, Speciesism, Sanatan & Biological Reaso...
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
 

Unit 5 presentation

  • 1. By: Todd M. Lowdermilk 1
  • 2. Course participants will be able to correctly list and describe a minimum of eighth of the ten principals of home network security without the use of any supplemental documentation. 2
  • 3. COAX Cable Modem Line In WiFi Signal Ethernet NAS Cable Ethernet Router / Firewall Cable Ethernet Cable Camera Computer Computer Laptop XBox 3
  • 4. 1. Position the Router or Access Point Safely 2. Change the default SSID (network name) 3. Change default usernames and passwords 4. Disable SSID Broadcast 5. Turn on (Compatible) WPA / WEP Encryption 4
  • 5. 6. Enable MAC Address Filtering 7. Do Not Auto-Connect to Open Wi-Fi Networks 8. Assign Static IP Addresses to Devices 9. Enable Firewalls On Each Computer and the Router 10. Turn Off the Network During Extended Periods of Non-Use 5
  • 6. It is important to note that some of these security measures may not be possible due to limitations such as the availability of cable and power connections in relation to the position of the router or access point. Also, I’m not an avid fan of turning my router off when I’m away for extended periods of time or disabling SSID broadcast as they are simply inconvenient. However, if you implement even just a handful of these security principals you can drastically lessen the chances of your network being compromised. Title Slide Image by: Goehring, David (CarbonNYC), 2008, Flickr from Yahoo. Accessed 28 Feb. 2012. http://www.flickr.com/photos/carbonnyc/2294144289/ 6