Using Mobile Computers Lesson 12

Similar documents
LESSON 12: WI FI NETWORKS SECURITY

6293A Troubleshooting and Supporting Windows 7 in the Enterprise

Managing and Maintaining Windows 8

Wireless Attacks and Countermeasures

Basic Wireless Settings on the CVR100W VPN Router

Securing Wireless LANs with Certificate Services

Configuring Wireless Security Settings on the RV130W

CTS2134 Introduction to Networking. Module 08: Network Security

MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Windows 7, Enterprise Desktop Support Technician

What is Eavedropping?

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Windows Client, Enterprise Desktop Support Technician

Course D:Implementing and Managing Windows 100

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

Wireless LAN Security. Gabriel Clothier

Configuring File Server Resource Manager (FSRM)

Troubleshooting and Supporting Windows 7 in the Enterprise

Windows 10 and the Enterprise. Craig A. Brown Prepared for: GMIS

Implementing and Managing Windows 10

Course Outline. Implementing and Managing Windows 10 Course C: 5 days Instructor Led

Computer Visions Course Outline

Wireless technology Principles of Security

Standard For IIUM Wireless Networking

Installing and Configuring Windows 10 5 Days, Instructor-led

COURSE 10982: SUPPORTING AND TROUBLESHOOTING WINDOWS 10

Course 10982B: Supporting and Troubleshooting Windows 10

ECHONET Lite SPECIFICATION. ECHONET Lite System Design Guidelines 2011 (2012) ECHONET CONSORTIUM ALL RIGHTS RESERVED

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Overview. Audience Profile. At Course Completion. Module Title : 10982B: Supporting and Troubleshooting Windows 10. Course Outline :: 10982B::

10982 Supporting and Troubleshooting Windows 10

COURSE B: INSTALLING AND CONFIGURING WINDOWS 10

Wireless Security and Monitoring. Training materials for wireless trainers

Supporting and Troubleshooting Windows 10

Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Exam Questions

Wireless Security. Training materials for wireless trainers

Installing and Configuring Windows 10

Mobility Windows 10 Bootcamp

The secondary audience for this course can include students preparing to take exam

Exam Questions Demo Microsoft. Exam Questions

Computer to Network Connection

MU2b Authentication, Authorization and Accounting Questions Set 2

Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

Security in IEEE Networks

Chapter 24 Wireless Network Security

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Supporting and Troubleshooting Windows 10

300Mbps Wi-Fi Router. Expand Wi-Fi Coverage. TL-WR820N 300Mbps Easy Setup IPTV IPv6

802.11N Wireless Broadband Router

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

"Charting the Course to Your Success!" MOC D Supporting Windows 8.1 Course Summary

802.11N Wireless ADSL Router

Configuring & Troubleshooting a Windows Server 2008 R2 Network Infrastructure

Troubleshooting and Supporting Windows 7 in the Enterprise

The Launch GDS can be updated via a wireless internet connection as well as by USB or cat5 cable.

Eduroam wireless network - Mac OSX 10.5 Leopard

AC Wi-Fi Range Extender RE580D. Highlights

Exam /Course C or B Configuring Windows Devices

Configuring the Client Adapter through Windows CE.NET

VPN Routers DSR-150/250/500/1000AC. Product Highlights. Features. Overview. Comprehensive Management Capabilities. Web Authentication Capabilities

Unified Services Routers

Yealink T48S Wireless Settings

Add a Wireless Network to an Existing Wired Network using a Wireless Access Point (WAP)

Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide

COURSE OUTLINE: Supporting and Troubleshooting Windows 10

Network Security. Thierry Sans

VPNS BY RICK FREY.

School of Computer Sciences Universiti Sains Malaysia Pulau Pinang

PPP Tunneling. Step by step explanation and configuration for creating PPP Tunnel

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

F100 Basic Setup Instructions

Mobile Printer CMP-40 Utility Manual (V1.76)

JNR1010v2 N150 Wireless Router User Manual

Wireless Network Security

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Configuring a VAP on the WAP351, WAP131, and WAP371

Updating Your Technology Knowledge of Microsoft Windows XP to Windows 7 Beta

NWD2705. User s Guide. Quick Start Guide. Dual-Band Wireless N450 USB Adapter. Version 1.00 Edition 1, 09/2012

BRT-AC828 Dual-WAN VPN Wireless Router

Designing AirPort Extreme n Networks

Troubleshooting and Supporting Windows 7 in the Enterprise

COPYRIGHTED MATERIAL. Contents

Introducing Windows 7 Lesson 1

Guide to Networking Essentials, 6 th Edition. Chapter 7: Network Hardware in Depth

BitLocker Group Policy Settings

Chapter 3 Wireless Configuration

Configuring Windows 10 Devices (697)

"Charting the Course... MOC D Configuring Windows 8.1 Course Summary

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Course Outline. Installing and Configuring Windows 10 Course 20698A 5 days Instructor Led

AC750 Dual Band Wireless-AC Access Point, Router and Repeater - Wall Plug

Microsoft. Microsoft. Course 20688D: Supporting Windows 8.1. Level : 200 Technology : Windows 8 Delivery Method : Instructor-led (classroom)

TROUBLESHOOTING GUIDE

MIS NETWORK ADMINISTRATOR PROGRAM

Course : Installing and Configuring Windows 10

PMS 138 C Moto Black spine width spine width 100% 100%

Transcription:

Using Mobile Computers Lesson 12

Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections

Using Windows 7 on a Mobile Computer Special configuration settings Power and display options Windows 7 supports tablet PCs Reversible screen, touch sensitive, write on with a stylus Handheld devices, such as SmartPhones, need to be synchronized

Understanding Wireless Security Easy to establish a wireless connection, but a secure one is more difficult. Some types of attacks common to unsecured networks: Eavesdropping Masquerading Attacks against wireless clients Denial of service Data tampering

Evaluating Wireless Networking Hardware IEEE 802.11 standards dictate frequencies, transmission speeds, and ranges of wireless networking products. Newer devices can fall back to support older devices at lower speeds. Security protocols are not backward compatible: Wired Equivalent Privacy (WEP) WiFi Protected Access (WPA and WPA2)

Using Wired Equivalent Privacy (WEP) Uses a security setting to encrypt network traffic Secret or shared key Administrators must configure all devices with the same shared secret key Relatively weak cryptography

Using Wi-Fi Protected Access (WPA and WPA2) Addresses the weakness of WEP Two encryption options: Temporal Key Integrity Protocol (TKIP) Advanced Encryption System (AES) WPA has two operational modes: WPA-Personal (WPA-PSK) WPA-Enterprise (WPA-RADIUS)

Configuring Wireless Networking Manual configuration for wireless adapters that are supported directly by Windows 7

Windows Mobility Center Provides quick access to configuration settings used by mobile computer users

Configuring Mobile Display Options One of the benefits of mobile computing is the ability to collaborate with others. Display configurations are often changed to accommodate viewing: Connecting an external display Configuring multiple displays Using a display projector

Configuring Presentation Settings Configuration settings that users most often adjust before giving a presentation

Configuring Power Options Power consumption is a critical issue for laptop users who rely on batteries.

Synchronizing Data For users who connect to a network when in the office and need to take files with them when they are not connected Two types of synchronization: One-way Two-way

Using Offline Files A form of fault tolerance Workstations copy server-based folders to the local drive Users can work with the files whether the network is operational or not, or even if they disconnect from the network When the workstation reconnects, synchronization of the files occurs

Transparent Caching Causes Windows 7 to save copies of files accessed on a remote server on a local drive Do not remain available when disconnected from the network Provides users with faster repeat access and conserves bandwidth Similar to BranchCache feature, except cached files are not shared with other workstations

Using Sync Center Central control panel for all synchronization partnerships Pairs of folders or devices are configured to synchronize their data on a regular basis

Using BitLocker First released in Vista, and now available with Windows 7 Enterprise and Ultimate Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive: Increased data protection Integrity checking

Understanding BitLocker Requirements Computer must have a Trusted Platform Module (TPM) and a compatible BIOS. Has 5 operational modes: TPM + startup PIN + startup key TPM + startup key TPM + startup PIN Startup key only TPM only

Turning on BitLocker

Using Data Recovery Agents (DRA) A user account authorized to recover BitLocker drives with a digital certificate on a Smart Card Must be configured using Group Policy in an AD DS Must enable DRA recovery for each type of BitLocker resource you want to recover

Using BitLocker To Go New feature in Windows 7 Enables user to encrypt removable USB drives Flash drives and external HDs

Using Remote Network Connections For travelling or telecommuting users who must connect to the company network from a remote site: Dial-up Virtual Private Networking (VPN) Direct Access (new)

Understanding Virtual Private Networking Dial-up Connection Point-to-Point Protocol (PPP) Virtual Private Network (VPN) - tunneling

VPN Protocol Encapsulation Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) Secure Socket Tunneling Protocol (SSTP) Internet Key Exchange, Version 2 (IKEv2)

Creating a VPN Connection

Using VPN Reconnect When a VPN was interrupted, users had to manually re-establish the connection. Wireless has made this more of a problem. VPN Reconnect enables a computer to reconnect automatically.

Introducing DirectAccess Replacement for VPN Eliminates the need for clients to manually establish wide area connections to their networks Automatically connects to the network when connected to the Internet

Understanding the DirectAccess Infrastructure Invisible to the client, but complicated communications process with a long list of back-end infrastructure requirements: IPV6 Globally routable addresses Ipsec Provides additional security Extensive Server requirements Clients running Windows 7 Ultimate or Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server

DirectAccess Setup

Skills Summary Windows Mobility Center is a shell application that provides a central point of access to configuration settings that mobile computer users need. Configuring external displays is a common task for mobile computer users. Power settings allow you to control the power consumption of components in your mobile device. Offline files store copies of network files on the local drive, for use when the computer is disconnected.

Skills Summary (cont.) Sync Center is a central control panel for all of the synchronization partnerships. BitLocker encrypts all of the files on a volume and performs an integrity check before it permits the system to start. Dial-up or virtual private network (VPN) connections enable users to connect to a network from remote locations. DirectAccess simplifies the remote connection process for inexperienced users.