Wireless Security - Indiana University of Pennsylvania

Download Report

Transcript Wireless Security - Indiana University of Pennsylvania

Brianne Stewart
Steps to Protect Your
Wireless Network

1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Change default administrator password
Turn on WPA/WEP encryption
Change the default SSID
Enable MAC address filtering
Disable SSID broadcast
Disable auto-connecting to open Wi-Fi networks
Assign fixed IP address
Firewalls
Position router safely
Turn off network during long periods of non-use
Default Password

 The first step in protecting your network is to change
the default administrator username and password
 The login given is usually simple and easily picked
up by internet hackers
 Change it immediately
WPA/WEP Encryption

 Encryption is a form of technology that scrambles
messages sent over wireless networks
 You want to pick the strongest form you can find
 All devices on your network must share the same
encryption
Default SSID

 Most manufactures give their products the same
SSID
 Example: SSID for Linksys is ‘linksys’
 This makes it easier for someone to connect to your
network
 Change it immediately
MAC Address Filtering

 Routers keep track of the MAC addresses of all the
devices that connect to them
 Setting up your router to only recognize the MAC
addresses of your devices will help restrict your
network
Disable SSID Broadcast

 Wireless routers will broadcast your SSID over the
air
 This roaming feature will increase the chances of
someone logging on to your network
 This can be disabled easily
Auto-Connecting

 Do not auto-connect to open Wi-Fi networks
 This will expose you to security risks
 Computers may access this feature automatically
without the user realizing so it is important to make
sure this is turned off
IP Address

 Most people on a home network will use a dynamic
IP address, but it is too easy for hackers to get ahold
of these
 Instead use a static, or fixed, IP address
 A private IP address range should be used
Firewalls

 Used to protect networks from unwanted access
 Most routers now come with firewalls built in, but to
be safe you need to check and make sure it is turned
on
Position of the Router

 Avoid leakage
 The farther this signal reaches, the easier it is for
someone else to get on your network
 Center your router in your home to minimize
leakage
Turing off the Network

 During extended periods of non-use, your network
should be turned off
 This is the ultimate way of protecting your network,
but it is impractical to do it every time you get off the
internet
Why it is important

 If you do not have a secure network it is easy for
hackers to take control
 Follow the simple steps to secure your network and
it will be harder for anyone other than you to log in
to your network
Sources

 http://compnetworking.about.com/od/wirelesssec
urity/tp/wifisecurity.htm