Home Networks
Home networks are common but may be difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is challenging because of the numerous security threats that can exploit poorly configured and maintained network security (Ho et al, 2010). Users generally do not understand the normal encryption mechanism within wireless routers and access points. Additionally, users utilize weak security configuration within their wireless networks from lack cyber security knowledge.
A typical home wireless network consists of an access point (AP), several personal computers, and increasingly, personal devices such as tablets or cellphones. Today, a home wireless network is primarily used to provide access to a wired Internet connection via communication that occurs to and from an AP. Future home wireless networks are expected to feature different types of traffic (such as multimedia streaming) which may require efficient communication between any two devices in the home (Papagiannaki, Yarvis, & Conner, 2006).
Wireless Security
The security of each of the WLAN components such as devices (laptops, desktops, mobile phone and tablets), APs, and wireless switches are dependent on their WLAN security configuration. A homes network should have standardized security configurations for devices and APs (Yarvis, Papagiannaki, & Conner, 2005). A standardized configuration provides a base level of security, reducing vulnerabilities and lessening the impact of successful attacks.
WLAN attacks be divided into two types: passive and active. Passive attack are an attack in which an unauthorized party only monitors WLAN communications; the attacker does not generate, alter, or disrupt WLAN co...
... middle of paper ...
...Dual Band Wi-Fi Gigabit Router. The NETGEAR N750 supports both 2.5GHz and 5 Ghz channels. The built-in Network Genie enables the client to be able to monitor who is connecting to the home network, set-up security on the network, and determine the proper channel for both the 2.4Ghz and 5Ghz to limit interference other wireless networks. The laptops should connect to the 2.4Ghz while the streaming devices should connect to the 5Ghz. All the computers will have McAfee Total Protection installed. McAfee Total protection will assist in protecting the home network with Anti-Malware protection, a configured firewall, network manager utilities, and Web Safety tool to aid in determining malicious websites and emails (McAfee, 2015). A complete diagram on home network option one is found in Appendix A. Additionally, the cost estimates and associated are depicted in Figure 1.1.
Segmenting the wireless network from the wired network though, is not only a trust issue, wireless networks suffer from many attacks such as Denial of Service caused by interference. The access point that will provide wireless access will be connected to a wired switch, however the separation of the wireless network is proposed to be done with the use of virtual LANs. VLANs will separate the network to two logical networks operating on the same physical network. This separation will enchant network’s security as the main network will be inaccessible from customers as well as it will not be affected if the wireless network is facing issues. The AP must be using Wi-Fi Protected Access 2 (WPA2) security protocol that has advanced encryption standards comparing to
In this section we investigate attacks and threats to our primary devices. These attacks and threats are built off of the vulnerabilities the previous section and help to determine which security controls would be most valuable against future attacks.
Backing up data, avoiding a single point of failure, and making sure data is only put where it needs to be are a few extra precautions to keeping your network secure [8].
J. A. Gutierrez ,M. Naeve , E. Callaway , M. Bourgeois ,V. Mitter and B. Heile "IEEE 802.15.4:adeveloping standard for low-power low-cost wireless personal area networks", IEEE Network, vol. 15, no. 5, pp.12 -19 2001
Kashi, J. (2004, May). Wireless insecurity. Law Practice Today. Retrieved September 27, 2008, from http://www.abanet.org/lpm/lpt/articles/tch05041.html
Everyday when ET returns from his classes to his apartment he eagerly yearns to throw himself on top his comfy chair and simply surf the internet at his own convenience. Unfortunately, ET is living with two other roommates that maliciously wish to use all of their bandwidth on a daily basis. Ah, the horror! Luckily, ET has pondered away during his free time of how to resolve this emerging conflict. He has carefully noted that his apartment contains three computers: two desktops and one laptop. After consulting with his trusty side-kick, Andy Chung or better known as Andy, both of them absolutely believe that the most optimal solution to this conflict is to purchase a router. However, during ET's brief time in researching about routers he has discovered that he could a) purchase a wired router or b) purchase a wireless router.
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
Wireless local area networks (WLANs) have the potential to improve the flexibility, productivity, and the quality of work life of an enterprise (Sage Research Staff, 2001). Berean Institute is a typical two year college with about a staff of sixty eight employees and 250 students per semester. Berean teaches cosmetology, barbering and the latest software and hardware technology, which is located in Philadelphia, Pennsylvania. Berean currently has two locations in the Philadelphia area and using a Local Area Network (LAN).
Scenario 2: A Terrorist is war driving on the streets, hunting weak APs with poor security (like WEP). Once such an SSID is found, a cracking process is initiated. Once the cracking process successfully reveals the ‘secret key’ used for authentication, a connection is made to the AP and communication can be initiated.
This proposal is for a small office that will have users who are connected by Wi-Fi or cable. The network will include devices and resources that is shared among all the users. The network will need to have security measures in place to protect the entire network and keep the wireless access secure and available only to employees of the company.
There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks.
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
Users can connect instantly and easily to the internet through their wireless devices anytime anywhere.