13
Unsecured Wireless Networks Name: Ulysses Tyler Instructor: Heather F. Willis, Ph.D. Class: Arts and Science Capstone

Unsecured wireless networks final

Embed Size (px)

Citation preview

Unsecured Wireless Networks

Name: Ulysses Tyler

Instructor: Heather F. Willis, Ph.D.

Class: Arts and Science Capstone

Unsecured Wireless Networks

The Risks

• Everyday, wireless networks are setup around the world

• However, unsecure wireless networks can put users at risk

• As a result, unwanted guests can gain access to their network and retrieve personal information.

• The loss and damage that may occur, can become irrevocable (Ciampa, 2007)

Unsecured Wireless Networks

Intruders

• Wardrivers may be hackers who drive around your neighborhood in a vehicle with a wireless detection device in search of unsecured wireless networks (Barney, 2014)

• Hackers can then capture and see everything you do on your computer as well as view personal information

• Your information can be compromised in varying ways

Unsecured Wireless Networks

Types of Stolen Information

• Users credit card information can be stolen and then sold or used to purchase goods or services

• Hackers may also open up credit cards or bank accounts in your name and use the cards or accounts without your knowledge

• If your Social Security Number (SSN), bank account access codes, or other pertinent or private information is stored on your computer, it is subject to theft.

Unsecure Wireless Networks

Statistics

• A study done by Sophos in London, revealed 107,000 wireless networks were in use in within a 91 mile radius. Some 27% of wireless networks had no encryption at all or were Wired Equivalent Privacy (WEP) enabled (Barney, 2014)

• The WEP is the lowest form of protection that a user can have on their computer

• Below you will find a link to a video taken in 2006, which demonstrates how hijackers can spy on what the user is doing (Esengulov, 2008)

https://www.youtube.com/watch?v=A88XB7_Jz7s

Unsecured Wireless Networks

Complicated Instructions

• Some users have expressed that they experience complications when making efforts to set up a secure network.

• Understanding the complexity of the language used and the reading of the small print was considered to be a challenge(Ciampa, 2007)

• I would like to suggest that manufacturers improved documentation for the general public to utilize during the initial set-up period

Unsecured Wireless Networks

Targeted Audiences

Manufacturers

• First, I would target manufacturers to provide suggested improved instructions for setting up wireless routers and secure settings

End-users

• Once manufacturers are on board, I would then target the end users with a campaign that will inform them regarding the dangers of leaving their wireless connection unsecure

• Having improved instructions, users may be more apt to follow the necessary steps to secure their devices

Unsecured Wireless NetworksSolutions

• Instructions should clearly instruct the user how to log-in to the router

• To protect yourself, follow the steps below to access the site where password

changes to your account can be made

• Prior to changing your password, you will need to login to the router’s username

and password screen.

Login instructions:

1. Connected to your unsecure router

2. Open your internet browser and enter this web

address “192.168.1.1”

3. Once the username and password box

appears, enter “admin” for both boxes

4. Click the OK button and your administrator

page will appear

Unsecured Wireless Networks

Changing Administrator Passwords

How to Change your Administrator Password

1. Select administrator tab at the top.

2. Delete router password and enter a new password.

3. Confirm password and select save

• Any user can find the default administrator password of a wireless router by going to the manufacturers website

• Be sure to change the your wireless router’s administrator password provided!

• Be sure to use a password that include letters, numbers, and special characters. It is not advisable to use words that may be defined in a dictionary!

Unsecured Wireless Networks

Securing Wireless Network

Instructions for Securing Your Wireless Network

1. To secure wireless network select wireless tab

2. Select wireless security

3. Under security mode select WPA2 personal

4. Under shared key enter a strong password

5. Click save settings

Unsecured Wireless Networks

Additional Types of Instructions

• Settings such as Media Access Control (MAC)filtering, and turning off Service Set Identifier (SSID), should also be explained in a manner that novice beginners can understand.

• We all know that the instructions with the device covers this information, but again, there should be instructions that a beginner will understand

Conclusion

In conclusion, I hope that this PowerPoint will provide the audience with the importance of securing devices and understanding that doing so may keep out any unwanted guests. Furthermore, focus should be placed on manufacturers to develop improved instructions for beginners who are not familiar with configuring wireless routers. Finally, a campaign should be developed to assist the public with understanding dangers of leaving their wireless internet unsecure.

References

• Barney, B. (2014, June 23). Warbiking: Hacking with Your Helmet On . Retrieved December 30, 2014, from Security Metrics: http://blog.securitymetrics.com/2014/06/warbiking.html

• Brain, M., Wilson, T. V., & Johnson, B. (2013, april 13). How WiFi Works. Retrieved December 15, 2014, from Howstuffworks: http://computer.howstuffworks.com/wireless-network.htm

• Ciampa, M. (2007). CWSP Guide to Wireless Security. Boston: Course Technology.

• Esengulov, A. (2008, December 04). How To Secure Your Wireless Network Connection. Retrieved December 04, 2014, from Make us of: http://www.makeuseof.com/tag/secure-your-wireless-network-here-is-why-and-how/

• Gann, R. (2012, December 06). How to secure a wireless network. Retrieved December 15, 2014, from techradar: http://www.techradar.com/us/news/internet/how-to-secure-a-wireless-network-1075710#null

• hayward, J. (2012, June 11). How secure is your neighborhood? Retrieved December 30, 2014, from Human Events: http://humanevents.com/2012/06/11/how-secure-is-your-neighborhood/

• Huang, P. (2012, July 16). Understanding IEEE 802.11ac VHT Wireless. Retrieved December 15, 2014, from Electronicdesign: http://electronicdesign.com/communications/understanding-ieee-80211ac-vht-wireless

• Strom, D. (2010, June 17). 6 Annoying Router Problems - And How to Fix Them. Retrieved December 15, 2014, from PC World: http://www.pcworld.com/article/199130/6_Annoying_Router_Problems_And_How_to_Fix_Them.html

• Wawro, A. (2011, November 10). How To Lock Down Your Wireless Network. Retrieved December 15, 2014, from PC World: http://www.pcworld.com/article/243290/how_to_lock_down_your_wireless_network.html