SlideShare a Scribd company logo
Wireless
Security
Presenter: Vi Minh Toai
Email: minhtoai@yahoo.com
CCNA, MCSE, CEH, F5 Advance
Contents
 Wireless Overview
 Wireless Security Risks
 Enhance Wireless Security
 Wireless diagram for finance organization
2
I. Wireless Overview
 More convenience than wired LAN
 Easy to connect, easy to share
 High Transport Speed. 802.11ac standard can archive
maximum 1,69 Gbit/s
 Most technology devices support WLAN
(802.11a/b/g/n/ac): computer, phone, tablet, camera,
printer, television, memory stick,…
 Municipal wireless network: some cities have coverage
wireless such as Bangkok, Singapore, Ha long, Hoi an,
Da nang, Hue
3
II. Wireless security risk
 Weak encryption WEP
 MIM - Man in the middle
 Easy bridge to wired LAN
 Rouge AP, evil twin,…
 Untrusted providers: Firmware, Embedded
wireless chip on Housewares such as clothes iron,
water heater,…
4
III. Enhance Wireless Security
1. Create a Wireless Security Policy
2. Secure the WLAN
3. Protect Your Company from Outside Threats
4. Security Awareness Training
5
1. Create a Wireless Security Policy
 Acceptable use policy
 E-mail and communications activities
 Antivirus policy
 Identity policy
 Password policy
 Encryption policy
 Remote access policy
6
2. Secure the WLAN
 Use strong encryption: WPA, WPA2
 Change the default SSID, default administrator
account/ password.
 Use VLANs or MAC address control lists
 Disable SSID broadcast
 Guest access SSID
 AP Isolation
 Secure management ports
 Secure communications
 Physical secure Access points
 Limit Wireless range
 Turn off Wireless when not use
 Regularly changing encryption keys
7
3. Protect Your Company from Outside
Threats
 802.1X authentication: RADIUS
 Assign Static IP
 Network Firewall and personal firewall software
 VPN: Virtual Private Network
 NAC: Network Access Control
 Wireless IPS: Prevent unauthorized, rogue AP, evil
twin and other wireless threats
 Wireless Security Endpoints: BYOD
 Wireless Management System
 Logging
8
4. Wireless Security Awareness Training
 Train users for using wireless securely.
 Understand Wireless Security Policy and follow
the policy.
 Do Not Auto-Connect to Open Wi-Fi Networks
9
IV. Wireless diagram for finance
organization
 Requirements:
 Wireless used for customers and VIP employees,
especially for HO and meeting rooms.
 Highest security, prevent any wireless threats.
10
Wireless diagram for finance organization
 Diagram 1
11
Wireless diagram for finance organization
 Diagram 2
12
Comparison
Method Diagram 1:
Advantage
Diagram 1:
Disadvantage
Diagram 2:
Advantage
Diagram 2:
Disadvantage
Design Equip Firewall,
private Internet line
for Branches
No need to equip
private Internet
line for Branches
Performance Fast Internet
access, low
delay
Slow Internet
access, high delay,
can effect WAN
connection
Security Secure Internal
LAN, Internet
access cannot
go inside
Passthough WAN
Infrastructure, hard
to control security
Availability Keep access
Internet as if
WAN line lost
Cannot access
Internet if WAN
line lost
Operation Hard operation as
must control
separate Internet
line of branches
Easy to control
because of
central Internet
management at
HO
13
Which diagram is the best for your
company?
 It depends on what you need.
 If Wireless is deployed for several branches,
diagram 1 should be the best.
 If Wireless is deployed for huge branches, diagram
2 should be considered.
14
Wireless Solution Providers
 Airtight
 Cisco
 Aruba
 Ruckus
 Juniper
 Meraki
 HP
15
References
 http://www.cisco.com/web/solutions/smb/need_to/
five_ways_to_improve_your_wireless_security.ht
ml
 http://compnetworking.about.com/od/wirelesssecu
rity/tp/wifisecurity.htm
16
Questions and Answers
 Please contact:
minhtoai@yahoo.com
THANK YOU! 
17

More Related Content

What's hot

Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
Edureka!
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
Bryley Systems Inc.
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
PrateekChaudhary44
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Jiunn-Jer Sun
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Network security
Network securityNetwork security
Network security
Eshrak Rahman
 
Network security
Network securityNetwork security
Network security
mena kaheel
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
karanramani4
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
Sachin Darekar
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
Sophos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
imtnoida112
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
Dr. Ahmed Al Zaidy
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
Sophos
 

What's hot (20)

Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network security
Network securityNetwork security
Network security
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Chapter 8 Wireless Network Security
Chapter 8 Wireless Network SecurityChapter 8 Wireless Network Security
Chapter 8 Wireless Network Security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Get the Most From Your Firewall
Get the Most From Your FirewallGet the Most From Your Firewall
Get the Most From Your Firewall
 

Viewers also liked

Wireless Abc
Wireless AbcWireless Abc
Wireless Abc
chris20854
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
Arpit Bhatia
 
Classification 10
Classification 10Classification 10
Classification 10
Muhammad Ramzan
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
Rajan Kumar
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
Mehdi Poustchi Amin
 

Viewers also liked (7)

Wireless Abc
Wireless AbcWireless Abc
Wireless Abc
 
Wireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit BhatiaWireless LAN Security by Arpit Bhatia
Wireless LAN Security by Arpit Bhatia
 
Classification 10
Classification 10Classification 10
Classification 10
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 

Similar to Wireless security toai vm

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
Saravana Kumar
 
Wi Fi
Wi FiWi Fi
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
Zameer Abdul Azeez Mulla
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
Altaware, Inc.
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
Anil Pokhrel
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
Chetan Kumar S
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
Nazrin Parveen
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
Eyad Manna
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Zul Fikri
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
Deborah Gastineau
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
SANDEEPONSLIDESHARE
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
CARMEN ALCIVAR
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
Faiq Ali Sayed
 
Wi fi
Wi fiWi fi
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
Yousef Al-Mutayeb
 

Similar to Wireless security toai vm (20)

Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02Wi fipresentationshow-120916014142-phpapp02
Wi fipresentationshow-120916014142-phpapp02
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi-Fi technology presentation
Wi-Fi technology presentationWi-Fi technology presentation
Wi-Fi technology presentation
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wi fi
Wi fiWi fi
Wi fi
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 

Wireless security toai vm

  • 1. Wireless Security Presenter: Vi Minh Toai Email: minhtoai@yahoo.com CCNA, MCSE, CEH, F5 Advance
  • 2. Contents  Wireless Overview  Wireless Security Risks  Enhance Wireless Security  Wireless diagram for finance organization 2
  • 3. I. Wireless Overview  More convenience than wired LAN  Easy to connect, easy to share  High Transport Speed. 802.11ac standard can archive maximum 1,69 Gbit/s  Most technology devices support WLAN (802.11a/b/g/n/ac): computer, phone, tablet, camera, printer, television, memory stick,…  Municipal wireless network: some cities have coverage wireless such as Bangkok, Singapore, Ha long, Hoi an, Da nang, Hue 3
  • 4. II. Wireless security risk  Weak encryption WEP  MIM - Man in the middle  Easy bridge to wired LAN  Rouge AP, evil twin,…  Untrusted providers: Firmware, Embedded wireless chip on Housewares such as clothes iron, water heater,… 4
  • 5. III. Enhance Wireless Security 1. Create a Wireless Security Policy 2. Secure the WLAN 3. Protect Your Company from Outside Threats 4. Security Awareness Training 5
  • 6. 1. Create a Wireless Security Policy  Acceptable use policy  E-mail and communications activities  Antivirus policy  Identity policy  Password policy  Encryption policy  Remote access policy 6
  • 7. 2. Secure the WLAN  Use strong encryption: WPA, WPA2  Change the default SSID, default administrator account/ password.  Use VLANs or MAC address control lists  Disable SSID broadcast  Guest access SSID  AP Isolation  Secure management ports  Secure communications  Physical secure Access points  Limit Wireless range  Turn off Wireless when not use  Regularly changing encryption keys 7
  • 8. 3. Protect Your Company from Outside Threats  802.1X authentication: RADIUS  Assign Static IP  Network Firewall and personal firewall software  VPN: Virtual Private Network  NAC: Network Access Control  Wireless IPS: Prevent unauthorized, rogue AP, evil twin and other wireless threats  Wireless Security Endpoints: BYOD  Wireless Management System  Logging 8
  • 9. 4. Wireless Security Awareness Training  Train users for using wireless securely.  Understand Wireless Security Policy and follow the policy.  Do Not Auto-Connect to Open Wi-Fi Networks 9
  • 10. IV. Wireless diagram for finance organization  Requirements:  Wireless used for customers and VIP employees, especially for HO and meeting rooms.  Highest security, prevent any wireless threats. 10
  • 11. Wireless diagram for finance organization  Diagram 1 11
  • 12. Wireless diagram for finance organization  Diagram 2 12
  • 13. Comparison Method Diagram 1: Advantage Diagram 1: Disadvantage Diagram 2: Advantage Diagram 2: Disadvantage Design Equip Firewall, private Internet line for Branches No need to equip private Internet line for Branches Performance Fast Internet access, low delay Slow Internet access, high delay, can effect WAN connection Security Secure Internal LAN, Internet access cannot go inside Passthough WAN Infrastructure, hard to control security Availability Keep access Internet as if WAN line lost Cannot access Internet if WAN line lost Operation Hard operation as must control separate Internet line of branches Easy to control because of central Internet management at HO 13
  • 14. Which diagram is the best for your company?  It depends on what you need.  If Wireless is deployed for several branches, diagram 1 should be the best.  If Wireless is deployed for huge branches, diagram 2 should be considered. 14
  • 15. Wireless Solution Providers  Airtight  Cisco  Aruba  Ruckus  Juniper  Meraki  HP 15
  • 17. Questions and Answers  Please contact: minhtoai@yahoo.com THANK YOU!  17