Top Banner
Using Mobile Computers Lesson 12
31

Using Mobile Computers

Feb 24, 2016

Download

Documents

kirra

Using Mobile Computers. Lesson 12. Objectives. Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data Use BitLocker Drive Encryption Use remote network connections. Using Windows 7 on a Mobile Computer. Special configuration settings - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Using Mobile Computers

Using Mobile ComputersLesson 12

Page 2: Using Mobile Computers

Objectives• Understand wireless security• Configure wireless networking• Use Windows mobility controls• Synchronize data• Use BitLocker Drive Encryption• Use remote network connections

Page 3: Using Mobile Computers

Using Windows 7 on a Mobile Computer• Special configuration settings

– Power and display options• Windows 7 supports tablet PCs

– Reversible screen, touch sensitive, write on with a stylus

• Handheld devices, such as SmartPhones, need to be synchronized

Page 4: Using Mobile Computers

Understanding Wireless Security• Easy to establish a wireless

connection, but a secure one is more difficult. Some types of attacks common to unsecured networks:– Eavesdropping– Masquerading– Attacks against wireless clients– Denial of service– Data tampering

Page 5: Using Mobile Computers

Evaluating Wireless Networking Hardware• IEEE 802.11 standards dictate

frequencies, transmission speeds, and ranges of wireless networking products.

• Newer devices can fall back to support older devices at lower speeds.

• Security protocols are not backward compatible:– Wired Equivalent Privacy (WEP)– WiFi Protected Access (WPA and

WPA2)

Page 6: Using Mobile Computers

Using Wired Equivalent Privacy (WEP)• Uses a security setting to encrypt

network traffic – Secret or shared key• Administrators must configure all

devices with the same shared secret key

• Relatively weak cryptography• Authentication methods;

– Open system– Shared Key

• Better to used the open system.

Page 7: Using Mobile Computers

Using Wi-Fi Protected Access (WPA and WPA2)• Addresses the weakness of WEP• Two encryption options:

– Temporal Key Integrity Protocol (TKIP)– Advanced Encryption System (AES)

• WPA has two operational modes:– WPA-Personal (WPA-PSK)– WPA-Enterprise (WPA-RADIUS)

Page 8: Using Mobile Computers

Configuring Wireless Networking• Manual configuration for wireless

adapters that are supported directly by Windows 7

Page 9: Using Mobile Computers

Windows Mobility Center• Provides quick access to

configuration settings used by mobile computer users

Page 10: Using Mobile Computers

Configuring Mobile Display Options• One of the benefits of mobile

computing is the ability to collaborate with others.

• Display configurations are often changed to accommodate viewing:– Connecting an external display– Configuring multiple displays– Using a display projector

Page 11: Using Mobile Computers

Configuring Presentation Settings• Configuration

settings that users most often adjust before giving a presentation

Page 12: Using Mobile Computers

Configuring Power Options• Power consumption is a critical issue

for laptop users who rely on batteries.

Page 13: Using Mobile Computers

Synchronizing Data• For users who connect to a network

when in the office and need to take files with them when they are not connected

• Two types of synchronization:– One-way– Two-way

Page 14: Using Mobile Computers

Using Offline Files• A form of fault tolerance• Workstations copy server-based

folders to the local drive• Users can work with the files whether

the network is operational or not, or even if they disconnect from the network

• When the workstation reconnects, synchronization of the files occurs

Page 15: Using Mobile Computers

Transparent Caching• Causes Windows 7 to save copies of

files accessed on a remote server on a local drive

• Do not remain available when disconnected from the network

• Provides users with faster repeat access and conserves bandwidth

• Similar to BranchCache feature, except cached files are not shared with other workstations

Page 16: Using Mobile Computers

Using Sync Center• Central control panel for all

synchronization partnerships• Pairs of folders or devices are

configured to synchronize their data on a regular basis

Page 17: Using Mobile Computers

Using BitLocker• First released in Vista, and now

available with Windows 7 Enterprise and Ultimate

• Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive:– Increased data protection– Integrity checking

Page 18: Using Mobile Computers

Understanding BitLocker Requirements• Computer must have a Trusted

Platform Module (TPM) and a compatible BIOS.

• Has 5 operational modes:– TPM + startup PIN + startup key– TPM + startup key– TPM + startup PIN– Startup key only– TPM only

Page 19: Using Mobile Computers

Turning on BitLocker

Page 20: Using Mobile Computers

Using Data Recovery Agents (DRA)• A user account authorized to recover

BitLocker drives with a digital certificate on a Smart Card

• Must be configured using Group Policy in an AD DS

• Must enable DRA recovery for each type of BitLocker resource you want to recover

Page 21: Using Mobile Computers

Using BitLocker To Go• New feature in Windows 7• Enables user to encrypt removable

USB drives – Flash drives and external HDs

Page 22: Using Mobile Computers

Using Remote Network Connections• For travelling or telecommuting users

who must connect to the company network from a remote site:– Dial-up– Virtual Private Networking (VPN)– Direct Access (new)

Page 23: Using Mobile Computers

Understanding Virtual Private Networking

Dial-up Connection – Point-to-Point Protocol (PPP)

Virtual Private Network (VPN) - tunneling

Page 24: Using Mobile Computers

VPN Protocol Encapsulation• Point-to-Point Tunneling Protocol (PPTP)• Layer 2 Tunneling Protocol (L2TP)• Secure Socket Tunneling Protocol (SSTP)• Internet Key Exchange, Version 2 (IKEv2)

Page 25: Using Mobile Computers

Creating a VPN Connection

Page 26: Using Mobile Computers

Using VPN Reconnect• When a VPN was

interrupted, users had to manually re-establish the connection.

• Wireless has made this more of a problem.

• VPN Reconnect enables a computer to reconnect automatically.

Page 27: Using Mobile Computers

Introducing DirectAccess• Replacement for

VPN• Eliminates the

need for clients to manually establish wide area connections to their networks

• Automatically connects to the network when connected to the Internet

Page 28: Using Mobile Computers

Understanding the DirectAccess Infrastructure• Invisible to the client, but

complicated communications process with a long list of back-end infrastructure requirements:– IPV6 – Globally routable addresses– Ipsec – Provides additional security– Extensive Server requirements– Clients running Windows 7 Ultimate

or Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server

Page 29: Using Mobile Computers

DirectAccess Setup

Page 30: Using Mobile Computers

Skills Summary• Windows Mobility Center is a shell

application that provides a central point of access to configuration settings that mobile computer users need.

• Configuring external displays is a common task for mobile computer users.

• Power settings allow you to control the power consumption of components in your mobile device.

• Offline files store copies of network files on the local drive, for use when the computer is disconnected.

Page 31: Using Mobile Computers

Skills Summary (cont.)• Sync Center is a central control panel for

all of the synchronization partnerships.• BitLocker encrypts all of the files on a

volume and performs an integrity check before it permits the system to start.

• Dial-up or virtual private network (VPN) connections enable users to connect to a network from remote locations.

• DirectAccess simplifies the remote connection process for inexperienced users.