14
Wireless Security Addendum to Security+ Following is an addendum to a CompTIA Security+ slideset created by Daryl B. Heim Full time CompTIA A+ / Network+ / Security+ Contract Certification Trainer [email protected] * Designed for use during instructor-led, interactive presentations

Wireless network security

Embed Size (px)

DESCRIPTION

Used in CompTIA certification classes by full time contracted CompTIA trainer, Daryl B. Heim.

Citation preview

Page 1: Wireless network security

Wireless SecurityAddendum to Security+

Following is an addendum to a CompTIA Security+ slideset created by

Daryl B. HeimFull time CompTIA A+ / Network+ / Security+

Contract Certification [email protected]

* Designed for use during instructor-led, interactive presentations

Page 2: Wireless network security
Page 3: Wireless network security

ISP

I’m on cameraso I better stayoff the couch!

Page 4: Wireless network security

ISP

Page 5: Wireless network security

ISP

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

Router implementing

PAT

=

Page 6: Wireless network security

ISP

Port Forwarding vs Triggering

http://publicIP:1111

SOCKET

Page 7: Wireless network security

ISP

Port Forwarding vs Triggering

http://publicIP:1112

SOCKET

Page 8: Wireless network security

ISP

Port Forwarding vs Triggering

http://publicIP:1112

SOCKETGaming

computer

Page 9: Wireless network security

Port Forwarding

Page 10: Wireless network security

Port Triggering

Page 11: Wireless network security

ISP

Proxy Server implementing NAT in DMZ

Internal External

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

=

xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx =xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx =xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx =

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx Pool

Page 12: Wireless network security

How your computer turns a URL into an internet host address

DNS Namespace

Page 13: Wireless network security

ISP

Proxy Server implementing NAT in DMZ

System checks it’s own host name

System checks it’s resolver cache

System checks a proxy (if configured)

System checks it’s HOSTS file (static text)

System checks DNS servers

Page 14: Wireless network security

Defaults

Physical Encryption

Other