Premium Essay

Securing the Wireless Soho Network

In:

Submitted By jester909
Words 881
Pages 4
Abstract
Installing and getting a Small Office Home Office (SOHO) network set up is a simple task when using “Off The Shelf” equipment and the default configuration. Sadly it is not as secure as one would like. Using the default configuration leaves the network open to would be hackers, hijackers and the next door neighbor looking to get some free internet.
Today we are going to discuss the equipment used to build our SOHO and then how to step outside of the box and ensuring that we are secure. Our small businesses has a total of 5 employees working out of a converted basement. We use Verizon FIOS for our ISP using a Actiontec Wireless Broadband Router (GigE), 5 laptops, 1 PC and 1 wireless printer.
.
Router
The backbone of our SOHO network is the Actiontec Wireless Broadband Router (GigE) model number MI424WR (GigE). Out of the box it "support very high speed Internet service." with "speeds up to 1000 Mbps wired (with the Gigabit Ethernet interface) and 300 Mbps wireless” using a 802.11b/g/n chipset. It comes prebuilt with an Enterprise level security including; customizable firewall, stateful packet inspection, Denial of Service (DoS) protection, content filtering, intrusion detection, WPA and WEP WIFI encryption.
.
Physical Network Configuration
Our SOHO networks physical layout is pretty standard. Outside of the building is the Fiber Optic line that feeds into the Optical Network Terminal (ONT) for the building. From there a coaxial cable runs to the Actiontec Wireless Broadband Router (GigE). The 1 PC is “wired” to the router itself. The 5 laptops connect via the 802.11n WIFI signal as does the wireless printer. See diagram below.

The router is configured by default with the admin user name as “Admin” and a admin password of “Password1”. DHCP is enabled, MAC filtering is turned off. The SSID is LASQ and is broadcasted by default. The IP address

Similar Documents

Free Essay

Wireless Vulnerabilities

...Wireless Vulnerabilities DUE DATE: 01/10/2016 ISSC 680 BY: TAMMY BATTLE PROFESSOR: Dr. Louay Karadsheh Introduction What is vulnerability? Vulnerabilities are shortcomings in the physical design, association, strategies, work force, administration, organization, equipment, or programming that might be misused to make hurt framework. The objective of the preparatory helplessness evaluation is to add to a rundown of framework vulnerabilities (defects or shortcomings) that could be misused by a potential danger. For new frameworks, the quest for vulnerabilities ought to concentrate on security arrangements, arranged methodology, framework necessities definitions, and security item examination. For operational frameworks, break down specialized and procedural security highlights and controls used to ensure the framework. Weakness investigation includes the accompanying five security control territories: (FAA) * Technical – the computer hardware and software, modes of communication, and the system architecture. * Operational - methods that individuals perform as for as information system * Administrative - feeble countermeasures in the authoritative methodology that influence the information systems. * Physical - frail countermeasures in the physical design of, and access to, offices and fenced in areas where computerized data frameworks are house. * Personnel - feeble countermeasures in approach, procedure, and methods utilized for security screening...

Words: 2588 - Pages: 11

Free Essay

Network Plus

...CompTIA Network+ Practice Question Answers Question 1. Objective: Given a scenario, install and configure routers and switches. The IEEE standard 802.3af states the specifications for which of the following? a) Quality of Service b) VLANs c) Routing tables d) Power over Ethernet Question 2. Objective: Given a scenario, troubleshoot common router and switch problems. A user's remote marketing server has changed IP address schemes and now the user can no longer access it. The user further discovers that the distant end still has access to them. Which of the following is a possible cause? a) SNMP strings need to be added b) Firewall rules need to be configured c) Port bonding on the interface needs to be enabled d) The switch has lost power Question 3. Objective: Explain the purpose and features of various network appliances. Which of the following is a network device that allows remote users access to a network? a) DNS server b) Content filter c) Load balancer d) VPN concentrator Question 4. Objective: Given a scenario, use the appropriate network monitoring resource to analyze traffic. A technician suspects that a virus has been introduced on the network. Which network resource is BEST used to confirm this problem? a) Syslog b) SNMP c) Network sniffer d) Environmental monitor Question 5. Objective: Given a scenario, implement the following network troubleshooting methodology. A user reports a network connectivity problem. Which...

Words: 1379 - Pages: 6

Free Essay

Network Design

...Running head:PROJECT #3 Unit #3 Individual Project - Network Design For Champions, Inc. Travis Lee Thompson ITCO103-1201A-05 American International University Table Of Contents Network Architecture/Model ........................................................................................ Page 3 Star Network Topology (before the donation) .............................................................. Page 5 Star Network Topology (after the donation) ................................................................. Page 6 Advantages of the Star Network Design ....................................................................... Page 7 Disadvantages of the Star Network Design ................................................................... Page 8 Is an NOS needed? ......................................................................................................... Page 9 References ....................................................................................................................... Page 10 1. Network Architecture/Model The definition of "network architecture" is as follows: "Network architecture refers to the layout of the network, consisting of the hardware, software, connectivity, communication protocols and mode of transmission, such as wired or wireless." The existing hardware is currently 7 computers in which each computer consists of: Pentium 4 at 3.0 GHz; 100-GB IDE hard drive; 512 MB of memory, floppy drive;...

Words: 1150 - Pages: 5

Premium Essay

Test

...SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING Securing Wi-Fi Rogue Access within an Enterprise Setting Daniel Joel Clark A Capstone Presented to the Information Technology College Faculty of Western Governors University in Partial Fulfillment of the Requirements for the Degree Master of Science in Information Security Assurance January 9, 2014 1 SECURING WI-FI ROGUE ACESS WITHIN AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the...

Words: 18577 - Pages: 75

Premium Essay

Computer Security

... Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security fundamentals...

Words: 16205 - Pages: 65

Premium Essay

Final

... Introducing the Internet Protocol (IP)  TCP/IP Model review: Upper layers define non-physical (logical) networking functions Various Perspectives on the TCP/IP Model and Roles 3 Figure 8-2 Introducing the Internet Protocol (IP)  Network Layer protocols  IP: Most important protocol defined by Network layer  Almost every computing device on planet communicates, and most use IP to do so  Network layer also defines other protocols 4 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 1 Name ICMP ARP DHCP DNS Full Name Comments Messages that hosts and routers use to manage Internetwork Control and control packet forwarding process; used by Message Protocol ping command Address Resolution Used by LAN hosts to dynamically learn Protocol another LAN host’s MAC address Dynamic Host Used by host to dynamically learn IP address Configuration Protocol (and other information) it can use Allows hosts to use names instead of IP Domain Name address; needs DNS server to translate name System/Service into corresponding IP address (required by IP routing process) Other TCP/IP Network Layer Protocols Table 8-1 5 Introducing the Internet Protocol (IP)  Network Layer protocols: Part 2 Name Full Name RIP Routing Information Protocol Enhanced Interior EIGRP Gateway Routing Protocol Open Shortest Path OSPF First Comments Application that runs on routers so that routers dynamically learn...

Words: 9644 - Pages: 39

Free Essay

Yeszcxzxxvzxcvxzc

...Routers and Cisco Integrated Services Routers, the broadest and most versatile portfolio of products for enabling the deployment of multiple advanced services. Cisco is the worldwide leader in networking systems for organizations of all sizes, offering solutions that fully support enterprise-wide deployment of networked business applications. A foundation of the Intelligent Information Network, Cisco routers provide high availability, comprehensive security, integrated wireless, ease of management, and advanced Quality of Service (QoS) for today’s most demanding network services, including IP communications, video, customer relationship management, financial transactions, and other real-time applications. This guide shows how Cisco Services Aggregation Routers and Cisco Integrated Services Routers enable you to meet your current and future needs with modular designs, allowing incremental migration as your business and network requirements change. In this guide, you can see for yourself how Cisco delivers benefits beyond basic data access, providing services such as voice, security, and wireless as part of an integrated routing system that maximizes productivity and investment protection. Cisco Router Guide Series Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 32978 - Pages: 132

Premium Essay

Research

...Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States SEVENTH EDITION Data Communications and Computer Networks A Business User’s Approach Curt M. White DePaul University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Data Communications and Computer Networks: A Business User’s Approach, Seventh Edition Curt M. White Editor-In-Chief: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Editorial Assistant: Courtney Bavaro Marketing Director: Keri Witman Marketing Manager: Adam Marsh Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Media Editor: Chris Valentine Art and Cover Direction, Production Management, and Composition: PreMediaGlobal Cover Credit: © Masterfile Royalty Free Manufacturing Coordinator: Julio Esperas © 2013 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means—graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act—without the prior written permission of the publisher. For product information and technology assistance...

Words: 234459 - Pages: 938

Premium Essay

Sql Quiz

...abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally...

Words: 217433 - Pages: 870

Free Essay

Vodafone Annual Report 2012

...This is delivering results: we have outperformed our key competitors in most major markets, and returned over £10 billion to shareholders in the last 12 months. £46.4bn £11.5bn Group revenue increased 1.2% to £46.4 billion with a strong demand for data services and further voice penetration in emerging markets. Adjusted operating profit was £11.5 billion, slightly down on last year (up 2.5%* on an organic basis) supported by a good performance from our US associate, Verizon Wireless. £6.1bn Free cash flow of £6.1 billion, decreased due to the sale of our interests in China and France and a lower working capital benefit. 9.52p Total ordinary dividends per share of 9.52 pence, up 7.0% in line with our dividend per share growth target. We also paid a special dividend of 4.0 pence per share and our £6.8 billion share buyback programme is almost complete. £6.4bn Capital expenditure increased by 2.3%, as we continued to maintain our high level of investment to support our network strategy. 14.91p Adjusted earnings per share of 14.91 pence, down 11.0% on last year, resulting from the loss of income following the sale of several businesses and higher financing costs. Vodafone Group Plc Annual Report 2012 01 Business review In this year’s report Business review# 02 Overview 02 Who we are 04 What we do and how we do it 06 Where we do it 08 Where we are heading 10 How we’re doing Chairman’s statement Chief Executive’s review Industry trends...

Words: 87713 - Pages: 351

Premium Essay

Paper

...Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Premium Essay

Management Information Systems

...Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the Small Enterprise, Third Edition • Harris Security Management of Information Security, Second Edition • Whitman, Mattord Principles of Information Security, Third Edition • Whitman, Mattord Readings and Cases in the Management of Information Security • Whitman, Mattord Hands-On Information Security Lab Manual, Second Edition • Whitman, Mattord, Shackleford Database Security and...

Words: 223685 - Pages: 895

Premium Essay

Mass Media

...Media History Contents 1 Introduction 1.1 Mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 1.1.2 1.1.3 1.1.4 1.1.5 1.1.6 1.1.7 1.1.8 1.1.9 Issues with definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forms of mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Professions involving mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Influence and sociology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ethical issues and criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 2 6 6 7 8 10 10 10 10 11 11 12 12 12 12 16 16 17 17 17 17 17 17 18 19 20 21 21 21 1.1.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.12 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.13 External links . . . . . . . . ....

Words: 146891 - Pages: 588

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization. ii T eofContent abl 1.0 INTRODUCTION........................................................................................................................................................... 2 1.1 BASIC INTERNET TECHNICAL DETAILS ........................................................................................................................ 2 1.1.1 TCP/IP : Transmission Control Protocol/Internet Protocol .........................................

Words: 134858 - Pages: 540

Premium Essay

Information Security

...chapter 2 40 Chapter 2 you. I’ve asked Charlie Moody to come in today to talk about it. He’s waiting to speak with us.” When Charlie joined the meeting Fred said, “Hello, Charlie. As you know, the Board of Directors met today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start.” “Sounds expensive,” said Fred. Charlie looked at Gladys, then answered, “Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don’t have accurate estimates yet, but you can be sure we’ll put cost-benefit worksheets in front of you before we spend any money.” Fred thought about this for a few seconds. “OK. What’s our next step?” Gladys answered, “First, we need to initiate a project plan to develop our new information security program. We’ll use our usual systems development and project...

Words: 24411 - Pages: 98