0% found this document useful (0 votes)
2 views

Lab1 Detailed Design

The document outlines the essential components and configurations of wireless networks, emphasizing the differences between infrastructure and ad hoc networks. It highlights security risks associated with wireless and mobile networks, along with the importance of mobile security apps. Key considerations for mobile security and best practices are discussed to protect against threats such as malware and unauthorized access.

Uploaded by

Haronamery
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lab1 Detailed Design

The document outlines the essential components and configurations of wireless networks, emphasizing the differences between infrastructure and ad hoc networks. It highlights security risks associated with wireless and mobile networks, along with the importance of mobile security apps. Key considerations for mobile security and best practices are discussed to protect against threats such as malware and unauthorized access.

Uploaded by

Haronamery
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Study of Wireless Network

Components and Mobile


Security
Lab-1 Summary
Prepared by: Dr. Sara Abu Gazalah
Learning Objectives

• • Understand the essential components of a wireless network.


• • Identify different types of network configurations (Infrastructure vs. Ad
Hoc).
• • Recognize security risks in wireless and mobile networks.
• • Explore mobile security apps and their protective features.
Introduction to Wireless Networks

• • Wireless networks eliminate the need for physical cables, offering


flexibility.
• • They require specific hardware for efficient operation.
• • Two main types: Infrastructure networks (router-based) and Ad Hoc
networks (peer-to-peer).
Infrastructure Networks

• • Uses routers and access points to manage connections.


• • Most common in homes, offices, and enterprises.
• • Provides structured communication and internet access.
Ad Hoc Networks

• • Devices connect directly without a central router.


• • Used for temporary connections, file sharing, or emergency situations.
• • Limited range and performance compared to infrastructure networks.
Key Components of a Wireless Network

• • Understanding hardware components improves network setup and


troubleshooting.
Wireless Network Adapters

• • Required for devices to connect to wireless networks.


• • Built-in for modern laptops; external adapters available for desktops.
• • Supports different wireless standards (802.11a/b/g/n/ac/ax).
Wireless Routers

• • Serve as the main hub in infrastructure networks.


• • Provide internet access and manage multiple device connections.
• • Includes features like dual-band Wi-Fi, firewall, and parental controls.
Wireless Antennas

• • Enhance wireless signal strength and coverage.


• • Directional vs. Omnidirectional antennas.
• • Can be built-in or externally attached.
Wireless Repeaters (Range Extenders)

• • Boost signal range by retransmitting wireless signals.


• • Help in covering dead zones in larger areas.
• • May reduce overall network speed due to retransmission delays.
Wire-Based Connections in Wireless Networks

• • Hybrid networks use wired connections for stability and wireless for
mobility.
• • Ethernet ports on routers allow wired device integration.
• • Power over Ethernet (PoE) can supply power and data via a single cable.
Advantages of Wireless Networks

• • Enhanced mobility and flexibility.


• • Easier setup and scalability.
• • Supports multiple devices without physical infrastructure constraints.
Challenges of Wireless Networks

• • Interference from other electronic devices.


• • Security vulnerabilities (e.g., unauthorized access, data breaches).
• • Performance issues in crowded network environments.
Wireless Network Security

• • Encryption standards: WEP (weak), WPA, WPA2, WPA3 (strongest).


• • MAC address filtering for additional security.
• • Implementing firewalls and VPNs for enhanced protection.
Mobile Security: An Overview

• • Growing reliance on mobile devices increases security risks.


• • Mobile security apps provide protection against malware and hacking.
• • Common threats include phishing, malicious apps, and data leakage.
Key Considerations for Mobile Security

• • How are apps downloaded? (Official stores vs. third-party sites).


• • What security measures prevent malware infections?
• • How are app permissions managed to prevent unauthorized access?
CM Security (Clean Master)

• • Developed by Cheetah Mobile, offering various security features.


• • Protects devices from malware, phishing, and unauthorized access.
• • Includes additional tools like battery optimization and privacy locks.
Features of CM Security

• • Real-time virus scanning and malware detection.


• • Safe browsing to prevent online threats.
• • App lock for securing sensitive applications.
How CM Security Protects Users

• • Runs scheduled security scans to detect threats.


• • Monitors network activity for potential intrusions.
• • Provides real-time notifications on suspicious activities.
Alternative Mobile Security Apps

• • Avast Mobile Security - Comprehensive free antivirus.


• • Bitdefender Mobile Security - Strong malware protection.
• • Norton Mobile Security - Focuses on identity protection and secure
browsing.
Best Practices for Mobile Security

• • Keep software and operating systems updated.


• • Download apps only from trusted sources.
• • Use strong passwords and enable two-factor authentication.
Case Study: A Mobile Security Breach

• • Example: A malicious app disguised as a popular tool.


• • How hackers exploited security loopholes.
• • Steps taken to mitigate the breach and protect users.
Conclusion

• • Wireless networks offer convenience but require security measures.


• • Understanding network components helps in better configuration.
• • Mobile security is essential to protect personal data and devices.

You might also like