0
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
{"ad_unit_id":"App_Resource_Sidebar_Upper","resource":{"id":3447196,"author_id":1762522,"title":"seguridad redes wifi","created_at":"2015-09-12T22:12:09Z","updated_at":"2016-06-01T00:32:08Z","sample":false,"description":"ñ","alerts_enabled":true,"cached_tag_list":"lcsanchez.1995@gmail.com, kata.o1@hotmail.com, nieves.f5@hotmail.com","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["lcsanchez.1995@gmail.com","kata.o1@hotmail.com","nieves.f5@hotmail.com"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3447196","folder_id":2601187,"public_author":{"id":1762522,"profile":{"name":"lcsanchez.19956145","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":null,"escaped_name":"lcsanchez.19956145","full_name":"lcsanchez.19956145","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
{"ad_unit_id":"App_Resource_Sidebar_Lower","resource":{"id":3447196,"author_id":1762522,"title":"seguridad redes wifi","created_at":"2015-09-12T22:12:09Z","updated_at":"2016-06-01T00:32:08Z","sample":false,"description":"ñ","alerts_enabled":true,"cached_tag_list":"lcsanchez.1995@gmail.com, kata.o1@hotmail.com, nieves.f5@hotmail.com","deleted_at":null,"hidden":false,"average_rating":null,"demote":false,"private":false,"copyable":true,"score":16,"artificial_base_score":0,"recalculate_score":true,"profane":false,"hide_summary":false,"tag_list":["lcsanchez.1995@gmail.com","kata.o1@hotmail.com","nieves.f5@hotmail.com"],"admin_tag_list":[],"study_aid_type":"MindMap","show_path":"/mind_maps/3447196","folder_id":2601187,"public_author":{"id":1762522,"profile":{"name":"lcsanchez.19956145","about":null,"avatar_service":"gravatar","locale":"es-ES","google_author_link":null,"user_type_id":null,"escaped_name":"lcsanchez.19956145","full_name":"lcsanchez.19956145","badge_classes":""}}},"width":300,"height":250,"rtype":"MindMap","rmode":"canonical","sizes":"[[[0, 0], [[300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Next up
Copy and Edit
Register for free tools and resources
Build free Mind Maps, Flashcards, Quizzes and Notes
Create, discover and share resources
Print & Pin great learning resources
Register Now
3447196
seguridad redes wifi
Mind Map by
lcsanchez.19956145
, updated more than 1 year ago
More
Less
Created by
lcsanchez.19956145
over 5 years ago
6
0
0
Description
ñ
No tags specified
lcsanchez.1995@gmail.com
kata.o1@hotmail.com
nieves.f5@hotmail.com
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":1,"sizes":"[[[1200, 0], [[728, 90]]], [[0, 0], [[468, 60], [234, 60], [336, 280], [300, 250]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":1},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}
Resource summary
seguridad redes wifi
1 INTRODUCCION
1.1 Tecnologías 802.11
1.2 Factores en distancia
1.2.1 Existencia de obstáculos.
1.2.2 Potencia de transmisión.
1.2.3 Antenas de alta ganancia.
1.2.4 Densidad de los mismos.
1.2.5 Sensibilidad de recepción.
1.3 Atacantes WI-FI
1.3.1 Ataque de negación de servicio.
1.3.2 Inyección de tráfico.
1.3.3 DOS
1.3.4 Acceso a la red.
1.4 Proteger red WI-FI:
1.4.1 Puntos de acceso
1.4.2 Controladores
1.5 Clientes
1.5.1 Ordenadores de escritorio
1.5.2 Portatiles
1.5.3 Smartphone
1.5.4 Tabletas
2 SEGURIDAD EN REDES WI-FI
2.1 Configuración de una red WI-FI
2.1.1 WEP,WPA,WPA2
2.1.2 Elementos de seguridad
2.1.2.1 Cifrado de comunicaciones
2.1.2.2 Control de acceso
2.2 Es recomendable que las empresas dispongan de un sistema de detección de intrusos inalámbrico. (WIDS)
3 RECOMENDACIONES DE SEGURIDAD
3.1 Es recomendable reducir el alcance de la señal.
3.2 No configurar la red WI-FI como oculta.
3.3 Emplear la tecnología de seguridad como WPA2- AES
3.3.1 En su versión personal (PSK) + contraseña larga.
3.4 Disponer de mecanismos de detención.
3.5 Evitar conectarse a redes WI-FI inseguras
3.6 Deshabilitar interfaz WI-FI cuando no se utilice.
4 Seguridad de los clientes WI-FI
4.1 Es el eslabon mas debil por tener un interfas wi-fi activo.
4.1.1 se recomienda el sistema operativo y controladores WI-FI actualizados.
4.2 Todos los clientes WI-FI almacenan una lista de redes.
4.2.1 PNL (preferred network list).
4.3 Ataques más comunes.
4.3.1 Punto de acceso falso EVIL-TWIN
4.3.1.1 Para evitar este tipo de ataques se implementa VPN (virtual private networks)
4.4 Vulnerabilidad VPN
4.4.1 Nivel 5 SSL y nivel 3 IPsec
4.5 Es preferible emplear redes WI-FI seguras con una tecnología VPNS y conexiones cifradas.
Media attachments
c2c51b6b-9169-4597-9e5e-e06f4da14f07.jpg (image/jpg)
7811f0f3-73e3-4fec-9c73-0e045ce9ebd3.jpg (image/jpg)
a19bd9b8-044b-40e3-be2b-3ecadb19f765.png (image/png)
d65a8e35-2669-4778-aba2-ae1bdf7bc5f2.jpg (image/jpg)
Show full summary
Hide full summary
Similar
Mapa Mental_REDES WIFI
oralia
Seguridad Redes WIFI
jose wilson cast
---- Redes Wifi ---- Jhonny Guerrero
jhorguma
SEGURIDAD DE LAS REDES WI-FI O INALÁMBRICAS
lilocujarba
Mapa Mental_REDES WIFI
yuby grande
GCSE Revision Tips
miminoma
Using GoConqr to study Economics
Sarah Egan
Psicoanalisis. modificado.
Michell Reyes
Mapa Mental para Resumir y Conectar Ideas
GABRIEL JARRO
Mapa Mental para Resumir y Conectar Ideas
jose betancourt
Primera Guerra Mundial
Johan bautista
Browse Library
{"ad_unit_id":"App_Resource_Leaderboard","width":728,"height":90,"rtype":"MindMap","rmode":"canonical","placement":2,"sizes":"[[[0, 0], [[970, 250], [970, 90], [728, 90]]]]","custom":[{"key":"env","value":"production"},{"key":"rtype","value":"MindMap"},{"key":"rmode","value":"canonical"},{"key":"placement","value":2},{"key":"uauth","value":"f"},{"key":"uadmin","value":"f"},{"key":"ulang","value":"en_us"},{"key":"ucurrency","value":"usd"}]}