CS-103

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Methods for Securing Wireless Devices

•Make sure that the operating system installed on the device is always current. •Sync your device often in order to create a copy of your data on your computer. •Check usage statistics to look for unauthorized usage. •Lock your device with a password and set the device to lock after a set period of time when no activity has been detected. •Disable the autoconnect feature for connecting to Wi-Fi networks; this prevents an unknown network from connecting to the device without permission. •Avoid storing login information and passwords on the device.

Personal Area Networking

•Personal area networking (PAN) refers to the wireless network that connects personal devices to each other. •There are two major types of PANs: •Using infrared technology, you can wirelessly beam information from one device to another •Bluetooth, the most popular method for creating PANs, provides short-range radio links between electronic devices •Bluetooth devices establish their communication with each other through a process called pairing.

Wireless Local Area Networking

•The transfer rate of data is the speed at which data is transmitted from an access point to a wireless device. •An access point is a hardware device with one or more antennae that permits communication between wired and wireless networks so wireless clients can send and receive data •The range is the physical distance between the access point and the wireless device. •Wi-Fi is often used as an alternative to wired connections •In businesses •In homes

Methods for Securing Wireless Networks: Wireless Encryption Methods

•Wi-Fi Protected Access (WPA) •Wi-Fi Protected Access (WPA) is a standard that was developed by the Wi-Fi Alliance to address some of the inherent weaknesses in WEP. •WPA provides better encryption than WEP because WPA uses a pre-shared key to encrypt data and individual data packets are encrypted with different keys. •Although WPA provides good protection, one drawback is that all devices in the network need to use WPA. This could be a drawback for some older devices.

Methods for Securing Wireless Networks

•Disabling the SSID Broadcast •When a wireless router or access point sends out its signal, it also broadcasts its service set identifier (SSID) as a way of identifying the network's name •The SSID makes it possible for roaming devices to discover the network and enables you to log in to the correct network. •Most manufacturers of wireless routers and access points use the manufacturer name or the word "default" as the default SSID for a device. •When you install a wireless router or access point, you can accept the default name or change it to a name that has up to 32 alphanumeric characters. For security purposes, you should change the name in order to prevent wardriving. •Wardriving is driving through a neighborhood with a wireless device to locate homes and businesses that have wireless networks in order to gain access to them.

Methods for Securing Wireless Networks

•MAC Address Filtering •Each manufacturer of network interface cards adds a unique number, called a Media Access Control address (MAC address), to identify the device. •By not allowing unknown devices to make connections, MAC address filtering adds another layer of security to a wireless network. •The MAC address for detachable network interface cards is usually printed on the card or USB device. •A MAC address appears in the format 00:00:00:0A:0B:0C, as a combination of digits and letters.

The Evolution of Wireless Networks

•3G or third-generation wireless networks offer faster data transfer rates than 2G and constant connections; used to make and receive phone calls, display webpages, play MP3 files, watch videos, use GPS. •Mobile devices that combine the functionality of a cell phone with an operating system are usually called smartphones. •When developing 3G wireless networks, carriers faced two major obstacles: •Bandwidth: 3G wireless networks must operate in the spectrum where radio frequency can carry data. carriers needed to obtain a license from the U.S. government. •Cost: Carriers needed to obtain a license from the U.S. government and build transmission towers.

The Evolution of Wireless Networks

•A wired connection is one in which a device and the Internet service provider are connected using a cable. •A wireless connection occurs when data is transferred to another location without the use of any wires .•1G (first generation) wireless networks were the first wireless technology (1978); an analog cellular network for voice only. •Text messages contain only alphanumeric characters •2G wireless or second-generation wireless is used primarily for voice conversations and text messages; the data transfer rate is too slow to receive formatted information, such as a webpage.

Wireless Local Area Networking

•A wireless local area network (WLAN) is a network on which devices use high-frequency radio waves instead of wires to communicate with a base station, which is connected to the Internet. •Wi-Fi or wireless fidelity is the trademarked name of the Wi-Fi Alliance that specifies the interface between a wireless client and a base station, or between two wireless clients to create a hotspot •A hotspot is an area of network coverage.

Session 7.2 Visual Overview: Wireless Security Concerns

•Discusses wireless security concerns including those associated with •Service interruptions •Data interceptions •Theft (data and/or devices) •Hacking •Malicious Files •Personal harm

Session 7.1 Visual Overview: Wireless Devices Timeline

•Presents a timeline for the development of wireless devices: •First generation (IG) starting in 1978-Transmit voice data only• Second generation (2G) starting around 1990-Transmit voice and small amounts of unformatted data like SMS messages, and later simple webpages• Third generation (3G) starting around 2000-Transmit data quickly at up to 2 Mbps; and 3.5 G transmitting up to 10 Mbps; devices can stay connected over wider geographical areas, send and receive email, browse the web •Fourth generation (4G) starting around 2010-Transmit data even more quickly at very fast rates, even up to 50 Mpbs; devices become more like a computer - doing many computer-like tasks on a smartphone

Understanding Security Threats to Wireless Devices

•Security Risks with Smartphone Applications •The predominant operating systems for smartphones are Apple iOS and Android. •Smartphones have an operating system that can run programs, also called applications or apps. •Apps are developed by companies or amateur programmers and are typically available for free or for a small fee. •Smartphone users should be especially careful when installing apps because, in some limited cased, an app might contain malware or other security threats. •Jailbreaking (on an Apple device) or rooting (on an Android device) is unlocking the operating system on a device in order to disable the device so it can run apps from other providers. Unlocking your phone in this manner will likely compromise the security features provided by the device's operating system.

Security Concerns for Wireless Networks

•Some of the security challenges are the same between wired and wireless networks. •One challenge that is unique to a wireless network is that a wireless network sends its data through the air using radio signals that are subject to interception. •The most basic security threat for wireless devices is the theft of the device itself.

Using Wireless Devices to Access the Internet

•The best way to begin a search for wireless solutions is to begin with an exploration of the network you will use. •Most carriers offer specific products to work on their wireless networks. •Some networks, such as those found in airports and hotels, let you pay a daily fee to use the network; other networks require a monthly fee for using the network.

The Internet of Things

•The term "Internet of Things" (IoT) was coined in 1999; also referred to as Internet of Everything (IoE) •Web of Things (WoT) •The IoT uses machines and other devices that are manufactured with embedded sensors or other mechanisms that collect and transmit data using wireless network connections so that data that can be acted upon by a person or another machine. Examples include: •a smartphone or a smart watch that reports how many steps you have taken today •an app that lets you change the temperature of your home before you arrive •medical sensors for continuous glucose monitoring for a diabetic person •heartbeat monitor for someone with an irregular heartbeat

Understanding Security Threats to Wireless Devices

•Using Public Hotspots Safely •Avoid online banking, online shopping, and visiting websites that require logins (a username and password). •Don't work in public places if you need to interact with something of value. •Establish a connection to a network that provides some kind of login from the access point's owner even if you have to pay a fee. This connection is more secure than a free hotspot. •Opt for a wired Ethernet connection whenever possible when working in a business facility, such as a convention center, sports arena, hotel, or other large building that provides Internet access.

Methods for Securing Wireless Networks

•Wireless Encryption Methods •Encryption is the process of coding information so that it is not readable by devices or people who do not have the secret key used to return the information back to its original, readable state. •Many wireless networks are unsecured by default and so must be secured. •There are many wireless encryption methods that provide different levels of protection for wireless networks.

Understanding Security Threats to Wireless Devices

•Wireless devices are subject to over-the-shoulder attacks, in which an unauthorized person uses his or her physical proximity to your device to attempt to get your login information, passwords, or other sensitive data while you are working. •When working in public places, be aware of where other people are located in proximity to you and your device. •Most security experts advise against activities such as online banking, checking email, and online shopping in public places. •An evil twin attack or café latte attack is when a hacker gathers information about an access point and then uses that information to set up his computer to impersonate the access point. •When you use a free public hotspot, the data you send is not usually encrypted or secure and so it is subject to hackers using sniffer programs. •A man-in-the-middle attack (MITM attack) occurs when transmissions that are being sent between two devices are intercepted by a third party.

Wireless Wide Area Networking

•Wireless wide area networking (WWAN) makes it possible to access the Internet from anywhere within the boundaries of the WWAN. •A WWAN is a wireless network that provides network coverage to a large geographical area. •To access the Internet using a WWAN, you need an integrated or a separate mobile broadband card, an Aircard, or a USB modem for the device that you want to use, as well as an account with the cellular carrier that operates the network. •LTE (Long Term Evolution) provides wireless broadband connections at very fast speeds to large geographical areas in the United States and in many other areas of the world.


Set pelajaran terkait

ALL Pharm cards for Final Review

View Set

Exam one: evidence based research

View Set

Digestion and Absorption - Chapter 40

View Set

學華語向前走2第九課教室在北方

View Set

International Business Final Exam

View Set

Ms. Cherney's ALGEBRA FINAL EXAM REVIEW 2021-2022

View Set

Biology 1309 Life on Earth exam 5

View Set

Saunders Ch 35 Oncological Disorders

View Set

Chapter 8 LS Intermediate Corporate Finance

View Set