31 hours 29 minutes

Video Description

Encryption and Device Signal / Placement This lesson covers device signal and device placement and how they have a role in creating a secure WiFi connection. This is not as important as encryption but it is still a necessary concept. Device placement has to do with where devices are placed in a WiFi network and how strong the signal needs to be. The wireless signal needs to be prevented from bleeding out of the office where it can be vulnerable to hackers who might be sitting in the parking lot with a laptop trying to hack into the network. Device placement is integral to allowing employees to access the network all the while keeping important information safe.

Video Transcription

now next up, outside of our different encryption methods, we have device signal and plate device signaling device placement. Now. Device signal signal and device placement are not as important security wise as our encryption, but it's still a pretty still pretty hot topic.
Now, Device signal and pray. Replacement essentially is where we're placing our device in our network and how strong we configure our device to send out its signal. So, essentially, where are the range of our wireless signal goes
now? This is important because we want to prevent our wireless signal from bleeding outside our our work space. We have our diagram here of our office building set up,
and we have our third floor with
several users are second floor with several users. We have a first floor with our lobby and then we have
an attacker sitting outside in our parking lot.
we have our encryption enabled on our wireless access point. We have our
d H cp disabled on our wireless access point. We have several other factors already set on our wireless active access point. That act is security measures, and that's great.
But just by the fact that our wireless signal bleeds into the parking lot means that we've opened up in a potential attack vector for someone just to sit in their car all day and try to break into our wireless
now just because our wireless is secure and just because we feel confident in the security of our wireless access point
doesn't mean we need to push it,
people can sit in their car and they in this person could just try to guess appreciated keys all day. Or they could potentially try to send out signals and disrupt communications between our wireless access points and are in users. They may try to send out the authentications signals
so they may just be attempting to gain more information about our wireless access point. They may try to get the type of maybe the make and model of our wireless access point. They're waiting for a vulnerability to come out there. Maybe they're trying to set up a replica of our wireless access point set up at their home,
and then they're just going to try and see if they can attack that one and break into that one
and then use that knowledge to break into our wireless access point. Whatever they're doing,
we don't want them doing it in our parking line. We want to make sure that we're eliminating the potential attack surfaces for people trying to connect into our network.
This is even. This is even more so. If this is an open wireless, maybe this needs to be an open wireless, because this wireless is meant for people who come into our office space and connect as we have a lot of sales clients coming in and pitching ideas, and they need to connect their devices or they need to connect there.
And the management has said we need an open wireless access point that anyone could connect into. They accept the terms of agreement, and they connect into that This. We don't want someone sitting in our parking lot all day browsing our Internet.
That's our resource is that they're using, so we wanna try to eliminate that.
So right now we have our wireless access point on the second floor, servicing everyone in the office. It's at Max signal capacity and it's bleeding over into our parking lot, and we found this out by doing our site survey. We went around and we found out the maximum range of where our signal was bleeding out, too. So instead of
putting it in the exact center of our office,
maybe we determine that. Okay, I only need my wireless signal to go on my 1st 2 floors.
Our first floor is the lobby
in the lobby. Only has one or two people in it and both of them are connected with a wired in connection and they don't need a wireless connection.
So we're going to take this wireless access point.
We're going to move it to the third floor,
and instead of an omni directional antenna that goes in all directions, we're gonna set up a parabolic antenna that's going to just focus the signal
in one direction.
So we're gonna we're going to just focus it straight down
into our users. Or maybe even we set up two wireless access points
one of the third floor one on the second floor, and we set up in a parabolic antenna.
I should just send the signal
across the floor and we adjust the signal strength so that the signal does not bleed out outside of the office into our parking lot.
So what we've now done is we've now eliminated on additional potential attack Vector. We've eliminated a potential source of weakness from our network bleeding out into the parking lot. So now if this attacker wants to try to attack this wireless,
they to come into our building and get there, find their way onto our second or third floor,
which is will be a lot harder for them to dio than just sitting sit in their car all day long. So
I understand that for our network, the best solution may not just be setting up the highest powered wireless access point we have and cranking it up to 11. We may want to actually take wireless access point, reduced its signal strength and have it set up. So it's just servicing
the area and just servicing the network size that we wanted to service

Up Next

CompTIA Network+

This CompTIA Network+ certification training provides you with the knowledge to begin a career in network administration. This online course teaches the skills needed to create, configure, manage, and troubleshoot wireless and wired networks.

Instructed By

Instructor Profile Image
Anthony Harris
Systems Analyst and Administrator at SAIC