Huang 1 Justin Huang Professor Bund CIS3100 20 October 2020 Personal Local Area Network 1. What is the IP address of your personal computer? 192.168.1.8 2. What is the IP address of the admin page of your router? 192.168.1.1 Router Security 1. Is an administrative password set, on your home wifi router? Yes 2. What encryption is set, on your home wifi router? WPA2-PSK[AES] 3. Is a password set, for connecting to your home wife router? What complexity requirements are put in place (password length, inclusion of non-letter symbols, etc) My password for connecting to my home wifi router has a mixture of lower and uppercase letters mixed with some numbers. 4. Research WPA, or whatever security protocol your router enforces. Is it as secure as it could be? Could you enforce a tougher security regime in your home network, in terms of connecting client computers to your router? Huang 2 WPA2 network security providers stronger cryptography and encryption. In addition, it uses AES which stands for advanced encryption standard, which is the most latest encryption service you can have today. Apart from WPA, you can use another security system called WPA enterprise. This security system forces users to authentic with a unique credential before accessing the home network. WPA is the best type of security for now because it has the latest and most updated encryption services. Transport Layer Security 1. Perform a capture of local wifi traffic in your home network. Locate connections to nonprivate network endpoints (traffic not originating from 192.168.x.x) Huang 3 2. Is Transport Layer traffic readable? Send a few emails to move text data to and from your remote email server. Are any frames legible to the human eye? There are some frames that are legible to the human eye. 3. Verify the SSL certificate on the endpoints (webpages) which you load in your browser. Are they encrypted via SSL, with active, valid certificates? Huang 4 4. What about your connections to Amazon, or other shopping sites? Are they encrypted securely, via SSL? Amazon and eBay both display that they are encrypted via SSL. Closing research component Investigate SSL-TLS. What security advantage does an organization gain, when they utilize this protocol? The security advantage that organizations gain from using SSL and TLS is that it ensures the information transferred between the online domain and the visitor of the domain is secure and private. This prevents hackers from stealing any kind of encrypted information which can be highly valuable. Summarize each step of your analysis in a word document (pdf preferred), optionally enclosing screenshots where you deem appropriate. Be sure to include written commentary for each stage of the analysis.