1 / 30

Computer Security

Computer Security. This presentation is intended to inform the audience about the dangers associated with a computer network devices and it is not a demonstration of any Hacking. Demos. Wireless Security Web Security. INDEX. Introduction A Step-by-Step process of Wireless Communications

Download Presentation

Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security

  2. This presentation is intended to inform the audience about the dangers associated with a computer network devices and it is not a demonstration of any Hacking .

  3. Demos • Wireless Security • Web Security

  4. INDEX • Introduction • A Step-by-Step process of Wireless Communications • Prevent Your Network from Getting Hacked

  5. INTRODUCTION

  6. Wireless Internet • It is internet access without the use of wires. • Instead it uses radio frequency bands to exchange information between your computer and the Internet within a range .

  7. Types of Wireless Security

  8. Types of Security • OPEN : No security configured • Obviously not advised • Data is in the air in plain text and anyone can read it • WEP : Wired Equivalent privacy • Very week and not recommended • Used in Open and Shared-Key Authentication

  9. Types of Security… • WPA: Wi-Fi Protected Access • Much better than WEP • Pre shared Key concept used • Encryption Algorithm used TKIP • Easy to setup, as easy as WEP • Available in all the common wi-fi routers • A must for all home users • Will take a long time to break in

  10. Types of Security… • WPA2: Advance Wi-Fi Protected Access • Better than WPA • Used AES as Encryption System • Takes little more pain to setup • Advised in corporate environments • Strong encryption and authentication support

  11. Wireless Security Standards

  12. Description of WEP Protocol WEP relies on a shared secret key (40 bit/128 bit) which is shared between the sender (client) and the receiver (Access Point). Secret Key - to encrypt packets before they are transmitted Integrity Check - to ensure packets are not modified in transit. The standard does not discuss how shared key is established. In practice, most installations use a single key which is shared between all mobile stations and access points. 12

  13. How to configure WPA • Open the configuration of your wi-fi device • Go to wireless setting • Under security option, select any one • WPA • WPA-PSK • WPA-Personal • WPA2-Personal • Set a complex password • Change the login password of the wireless router. • Done

  14. Look for this

  15. A Step-by-Step process of Wireless Communication

  16. A little info… • For Connecting with a AP user render data segment called Beacon frames. • After connected with AP the data segment is called Packet.

  17. More info… • Depending on how long the computer is connected, it can generate a certain number of packets per day. • The more users that are connected to one access point, the more packets are generated.

  18. First… • You must locate the wireless signal • This can be done by using your default Windows tool “View Available Wireless Network”

  19. Second… • Once you located a wireless network you can connect to it unless it is using authentication or encryption. • If it is using authentication or encryption then for the next step a Cracking tool can be use for WEP keys.

  20. Third…. • Once enough packets recovered it will then captured information gathered from the packets and crack the key giving you access.

  21. Prevent Your Network from Getting Hacked

  22. Prevent Your Network from Getting Hacked • Don’t broadcast your SSID . This is usually done during the setup of your wireless router. • Change the default router login to something else. • If your equipment supports it, use WPA or WPA 2 because it offers better encryption which is still able to be broken but much harder. • Always check for updates to your router. • Turn off your router or access point when not using it.

  23. Security Advised • Change the router login password frequently • At least once a month • Change the wireless WPA password also • At least once a month • Avoid temptation to connect to open wireless just looking for free internet.

  24. Security Advised.. • We can configure DHCP more tightly. • Lets not keep an open pool where any one can connect • Example • I have 3 machines in my home (desktop/laptop/phone) • I’ll create a IP pool of 3 IPs only • I’ll do DHCP reservation using the MAC of these 3 IP • Effectively I’m not allowing any outsider machine to connect

  25. Security Advised.. • We can configure MAC binding. • Allow only MY machines to connect • Many access points support MAC binding • Any other machine will not be able to connect to my Wi-Fi

  26. Web Security

  27. Man-in-the-Middle Attacks Stealing Passwords Trojan Horses Exploiting Defaults Wireless Attacks Methods

  28. MAC(Media Access Control) duplication ARP (Address Resolution Protocol) poisoning Router table poisoning Fake routing tables Man-in-the-middle(MITM) Attack

  29. Conclusion • There is no such thing as 100% percent security when using wireless networks but at least with these few simple steps you can make it harder for the average person to break into your network.

  30. Thank You

More Related