0% found this document useful (0 votes)
357 views18 pages

Wireless Security Techniques

The document discusses various wireless security techniques. It recommends applying security immediately when installing wireless services, such as using WEP encryption, changing default passwords, disabling SSID broadcasting, and using MAC filtering. It also recommends updating to the latest firmware and installing a firewall. The document describes different levels of wireless security from most to least secure, including LEAP, WPA, WEP 128, WEP 64, and no security. It also discusses how to manually create a wireless network profile using WEP shared key authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
357 views18 pages

Wireless Security Techniques

The document discusses various wireless security techniques. It recommends applying security immediately when installing wireless services, such as using WEP encryption, changing default passwords, disabling SSID broadcasting, and using MAC filtering. It also recommends updating to the latest firmware and installing a firewall. The document describes different levels of wireless security from most to least secure, including LEAP, WPA, WEP 128, WEP 64, and no security. It also discusses how to manually create a wireless network profile using WEP shared key authentication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Wireless Security Techniques

-Salamander
Traffic flows through radio waves in wireless
networks, so it is easy for attackers to monitor and
attack data without having to connect to a network
physically. Attackers gain access to a network by being
within range of an unprotected wireless network. A
technician needs to know how to configure access
points and wireless network interface cards (WNIC) to
an appropriate level of security.
When installing wireless services, you should apply the following
wireless security techniques immediately to prevent unwanted access
to the network:
Wired Equivalent Privacy (WEP) was the first-generation security
standard for wireless network. Attackers quickly discovered that 64-
bit WEP encryption was easy to break. Monitoring programs could
detect the encryption keys used to encode the messages. After the
keys were obtained, messages could be easily decoded. In an attempt
to overcome this weakness, most users employ a 128-bit key for WEP.
Change the default administration password.
Disable the broadcasting of the Service Set Identifier (SSID) to hide it
from other users.
Use MAC filtering to protect the network from other users.
Change the default values of the SSID by entering the setup
program for the access point and renaming the SSID.
Update to the latest available firmware.
Install or activate a firewall, and adjust the settings to
eliminate all traffic except the desired network settings.
Update to the latest available firmware.
Install or activate a firewall, and adjust the settings to
eliminate all traffic except the desired network settings.
An attacker can access data as it travels over the radio
signal. However, you can use a wireless encryption system to
encode data and thereby prevent unwanted capture and use
of the data. Both ends of every link must use the same
encryption standard. The following list describes the different
levels of wireless security, from most secure to least secure:

Lightweight Extensible Authentication Protocol (LEAP): Also


called EAP-Cisco, LEAP is a wireless security protocol created
by Cisco to address the weaknesses in WEP and WPA. LEAP is
a good choice when using Cisco equipment in conjunction
with operating systems such as Windows and Linux.
Wi-Fi Protected Access (WPA): An improved version of WEP. It was
created as a temporary solution until 802.11i (a security layer for
wireless systems) was fully implemented. Now that 802.11i has been
ratified, WPA2 has been released. It covers the entire 802.11i
standard.
WEP 128: An enhanced encryption protocol combining a 104-bit key
and a 24-bit initialization vector.
WEP 64: The first-generation security standard for wireless network.
It could be exploited because of an encryption key that was
vulnerable to decoding.
No security: Although you can elect to implement no security
whatsoever, you leave your wireless network completely vulnerable
to attack.
In addition, Wireless Transport Layer Security
(WTLS) is a security layer used in mobile devices that
employ the Wireless Applications Protocol (WAP).
Mobile devices do not have a great deal of spare
bandwidth to devote to security protocols. WTLS was
designed to provide security for WAP devices in a
bandwidth-efficient manner.
Creating a Manually network
profile using WEP shared key
authentication
1. Open Network and Sharing Center by clicking the Start
button, and then clicking Control Panel. In the search box,
type network, and then click Network and Sharing Center.
2. Click Set up a new connection or network.
3. Click Manually connect to a wireless network, and then click
Next.
4. On the Enter information for the wireless network you want
to add page, under Security type, select WEP.
5. Complete the rest of the page, and then click Next.
6. Click Change connection settings.
7. Click the Security tab, and then, under Security type,
click Shared.
8. Click OK, and then click Close.
Thanks!!!😊
ASSESSMENT
Test I. Modified True or False
1. SECURITY
2. VIRUS- PRIMARY
3. SECURITY
4. SECURITY
5. SECURITY
Test II. Matching Type
1. E
2. A
3. H
4. L
5. G
6. B
7. C
8. D
9. I
10. F
Test III. Acronym
1. Virtual Private Network
2. Service Set Identifier
3. Wired Equivalent Privacy
4. Wi- fi Protected Access
5. Wireless Transport Layer Security

You might also like