SlideShare a Scribd company logo
1 of 10
Wireless Security
What Is Wireless?
• Wireless communication, or sometimes simply wireless, is the transfer of
information or power between two or more points or computers that are
not connected by an electrical wires.
• Wireless technology has made dramatic changes in the way computer
users communicate worldwide. Billions of home and business users have
notebook computers, smart phones, and other mobile devices to access the
Internet, send e-mail and instant messages, chat online, or share network
connections all without wires.
Continue…
• Although wireless access provides many conveniences to users, it also
poses additional security risks. About 80 percent of wireless networks
have no security protection.
• To access the network, the individual must be in range of the wireless
network. Some intruders intercept and monitor communications as they
transmit through the air. Others connect to a network through an
unsecured wireless access point (WAP). In one technique, called “war
driving or access point mapping”, individuals attempt to detect wireless
networks
Continue…
via their notebook computer or mobile device while driving a vehicle
through areas they suspect have a wireless network.
• Some individuals instead use “war flying”, where they use airplanes
instead of vehicles to detect unsecured wireless networks.
Wireless Security
What is wireless Security?
• It is the prevention of unauthorized access to computer using wireless
networks.
• In addition to using firewalls, some safeguards that improve the security
of wireless networks include reconfiguring the wireless access point and
ensuring equipment uses one or more wireless security standards such as
Wi-Fi Protected Access and 802.11i.
Types Of Wireless Security
• WAP (wireless access point):
A wireless access point (WAP) should be configured so that it does not broadcast a
network name, known as an SSID (service set identifier). Users should change the
default SSID to prevent unauthorized users from accessing their wireless network.
The WAP also can be programmed so that only certain devices can access it.
• WEP (Wireless Equivalent Privacy)
It is one of the least secure form of security. It was developed for wireless networks
and approved as a Wi-Fi security standard in September 1999. However there are
bunch of security issues in WEP which also easy to break and hard to configure.
Continue…
• WPA (Wi-Fi protected access):
Wi-Fi Protected Access (WPA) is a security standard that improves on older
security standards by authenticating network users and providing more
advanced encryption techniques.
• WPA2:
It is also knows as 802.11i network, sometimes, the most recent network
security standard, conforms to the government’s security standards and uses
more sophisticated encryption techniques than WPA.
Tips for Wireless Network Security
• Change default Administrator Password:
The password provided are simple and very well known to hackers on
Internet.
• Turn on Encryption:
Encryption technology scrambles messages sent over wireless network , so
they cannot easily read by humans.
• Change the default SSID:
Change your network’s SSID to something unique.
Continue…
• Enable MAC Address Filtering:
With MAC address filtering, you specify which computers can access your
network.
• Position the router or access point safely:
Wi-Fi signals leakage - easier for others to detect
and exploit.
Try to position the access point or router near the center of the home rather
than near windows - minimize leakage.
Continue…
• Turn of the network during extended period of Non-Use:
If you own a wireless router but are only using it wired (Ethernet)
connections, you can turn off Wi-Fi on a broadband router without powering
down the entire network.
• Stop Auto-Connecting to Open Wi-Fi Networks:
Connecting to an open Wi-Fi network such as a free wireless hotspot or your
neighbor’s router exposes your computer to security Risks.
• Enable firewall on each computer and the router.

More Related Content

What's hot

WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALASaikiran Panjala
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology PresentationSIDJD
 
wireless networking
wireless networkingwireless networking
wireless networkingEstiak Khan
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeRahul Barick
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and ProtectionChandrak Trivedi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationTayabaZahid
 

What's hot (20)

Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
WLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALAWLAN SECURITY BY SAIKIRAN PANJALA
WLAN SECURITY BY SAIKIRAN PANJALA
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wi-Fi Technology Presentation
Wi-Fi Technology PresentationWi-Fi Technology Presentation
Wi-Fi Technology Presentation
 
wireless networking
wireless networkingwireless networking
wireless networking
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wifi security
Wifi securityWifi security
Wifi security
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
WIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my lifeWIFI Presentation and How it has Improved my life
WIFI Presentation and How it has Improved my life
 
Wi-Fi technology
Wi-Fi technologyWi-Fi technology
Wi-Fi technology
 
Wi-Fi (MIS)
Wi-Fi   (MIS)Wi-Fi   (MIS)
Wi-Fi (MIS)
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Wifi
WifiWifi
Wifi
 
Wi fi
Wi fiWi fi
Wi fi
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 

Similar to Wirless Security By Zohaib Zeeshan

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN securityRajan Kumar
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-FiBhushan Jadhav
 
Wireless router
Wireless routerWireless router
Wireless routerroza921
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksAltaware, Inc.
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1KowsalyaS12
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksChema Alonso
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringeceb9198
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
 

Similar to Wirless Security By Zohaib Zeeshan (20)

Wireless LAN security
Wireless LAN securityWireless LAN security
Wireless LAN security
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Wireless technology - Wi-Fi
Wireless technology - Wi-FiWireless technology - Wi-Fi
Wireless technology - Wi-Fi
 
Wireless router
Wireless routerWireless router
Wireless router
 
White paper - Building Secure Wireless Networks
White paper - Building Secure Wireless NetworksWhite paper - Building Secure Wireless Networks
White paper - Building Secure Wireless Networks
 
Wireless securit1
Wireless securit1Wireless securit1
Wireless securit1
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
wifi himanshu
wifi himanshuwifi himanshu
wifi himanshu
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless NetworksLiving in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
Living in the Jungle: Legitimate users in Legitimate Insecure Wireless Networks
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
Wireless and how safe are you
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are you
 
Wireless lan electronics and communication engineering
Wireless lan electronics and communication engineeringWireless lan electronics and communication engineering
Wireless lan electronics and communication engineering
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
PACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security ConsiderationsPACE-IT, Security+1.5: Wireless Security Considerations
PACE-IT, Security+1.5: Wireless Security Considerations
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 

More from Zaibi Gondal

C project on a bookshop for saving of coustmer record
C project on a bookshop for saving of coustmer recordC project on a bookshop for saving of coustmer record
C project on a bookshop for saving of coustmer recordZaibi Gondal
 
Programming fundamentals
Programming fundamentalsProgramming fundamentals
Programming fundamentalsZaibi Gondal
 
C programming Lab 2
C programming Lab 2C programming Lab 2
C programming Lab 2Zaibi Gondal
 
C programming Lab 1
C programming Lab 1C programming Lab 1
C programming Lab 1Zaibi Gondal
 
Functional english
Functional englishFunctional english
Functional englishZaibi Gondal
 
application of electronics in computer
application of electronics in computerapplication of electronics in computer
application of electronics in computerZaibi Gondal
 

More from Zaibi Gondal (10)

Modal Verbs
Modal VerbsModal Verbs
Modal Verbs
 
Parts of speech1
Parts of speech1Parts of speech1
Parts of speech1
 
C project on a bookshop for saving of coustmer record
C project on a bookshop for saving of coustmer recordC project on a bookshop for saving of coustmer record
C project on a bookshop for saving of coustmer record
 
Backup data
Backup data Backup data
Backup data
 
Programming fundamentals
Programming fundamentalsProgramming fundamentals
Programming fundamentals
 
C programming Lab 2
C programming Lab 2C programming Lab 2
C programming Lab 2
 
C programming Lab 1
C programming Lab 1C programming Lab 1
C programming Lab 1
 
Functional english
Functional englishFunctional english
Functional english
 
application of electronics in computer
application of electronics in computerapplication of electronics in computer
application of electronics in computer
 
Model Verbs
Model VerbsModel Verbs
Model Verbs
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 

Wirless Security By Zohaib Zeeshan

  • 2. What Is Wireless? • Wireless communication, or sometimes simply wireless, is the transfer of information or power between two or more points or computers that are not connected by an electrical wires. • Wireless technology has made dramatic changes in the way computer users communicate worldwide. Billions of home and business users have notebook computers, smart phones, and other mobile devices to access the Internet, send e-mail and instant messages, chat online, or share network connections all without wires.
  • 3. Continue… • Although wireless access provides many conveniences to users, it also poses additional security risks. About 80 percent of wireless networks have no security protection. • To access the network, the individual must be in range of the wireless network. Some intruders intercept and monitor communications as they transmit through the air. Others connect to a network through an unsecured wireless access point (WAP). In one technique, called “war driving or access point mapping”, individuals attempt to detect wireless networks
  • 4. Continue… via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network. • Some individuals instead use “war flying”, where they use airplanes instead of vehicles to detect unsecured wireless networks.
  • 5. Wireless Security What is wireless Security? • It is the prevention of unauthorized access to computer using wireless networks. • In addition to using firewalls, some safeguards that improve the security of wireless networks include reconfiguring the wireless access point and ensuring equipment uses one or more wireless security standards such as Wi-Fi Protected Access and 802.11i.
  • 6. Types Of Wireless Security • WAP (wireless access point): A wireless access point (WAP) should be configured so that it does not broadcast a network name, known as an SSID (service set identifier). Users should change the default SSID to prevent unauthorized users from accessing their wireless network. The WAP also can be programmed so that only certain devices can access it. • WEP (Wireless Equivalent Privacy) It is one of the least secure form of security. It was developed for wireless networks and approved as a Wi-Fi security standard in September 1999. However there are bunch of security issues in WEP which also easy to break and hard to configure.
  • 7. Continue… • WPA (Wi-Fi protected access): Wi-Fi Protected Access (WPA) is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques. • WPA2: It is also knows as 802.11i network, sometimes, the most recent network security standard, conforms to the government’s security standards and uses more sophisticated encryption techniques than WPA.
  • 8. Tips for Wireless Network Security • Change default Administrator Password: The password provided are simple and very well known to hackers on Internet. • Turn on Encryption: Encryption technology scrambles messages sent over wireless network , so they cannot easily read by humans. • Change the default SSID: Change your network’s SSID to something unique.
  • 9. Continue… • Enable MAC Address Filtering: With MAC address filtering, you specify which computers can access your network. • Position the router or access point safely: Wi-Fi signals leakage - easier for others to detect and exploit. Try to position the access point or router near the center of the home rather than near windows - minimize leakage.
  • 10. Continue… • Turn of the network during extended period of Non-Use: If you own a wireless router but are only using it wired (Ethernet) connections, you can turn off Wi-Fi on a broadband router without powering down the entire network. • Stop Auto-Connecting to Open Wi-Fi Networks: Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor’s router exposes your computer to security Risks. • Enable firewall on each computer and the router.