wi fi security

20
IMPACTS OF WIFI SECURITY CASE STUDY OF SOCIAL NETWORKS Assit.Prof. Chirasil Chayawan Communication and Integrated Services Study Center KMUTT

Upload: gruzabb

Post on 30-Jun-2015

104 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Wi fi security

IMPACTS OF WIFI SECURITYCASE STUDY OF SOCIAL NETWORKS

Assit.Prof. Chirasil ChayawanCommunication and Integrated Services Study Center

KMUTT

Page 2: Wi fi security

Main Technologies in Wireless

Proximity (Personal) area networkAd-hoc networkAlways connected in personal space

WLANMobile communication: 3G or beyondWLAN and mobile communication

InterconnectionDecoupling from terminal and applications from the

access methods

Page 3: Wi fi security

Integration of PAN, WLAN and Mobile communicationExtends users connectivityComplementary and hierarchical mannersUbiquitous wireless system

Page 4: Wi fi security

What is the weakest point in Wireless?

Wireless magnifies exposure vulnerabilityMobile device is

vulnerable to theft and lost.

Transmitted over the unprotected airwaves

Interoperability software: virus, hacking attacks

Page 5: Wi fi security

Wireless Vulnerability

Information going across the wireless link is exposed to anyone within radio range

The benefit of traditional wireline is the physical security

Page 6: Wi fi security

Mobile make it more…?

Difficult to establish trustDue to connection to physically hidden access pointCan service providers be trust in case of foreign networks?

Page 7: Wi fi security

System design issues

Mobile constraintsDesire low power consumption

Minimize computation Minimize network communication

By low processing capabilitiesBy limited link capacity

What mobile need?Cryptographic and other security algorithms to be simpleMinimize overhead for security protocol

Page 8: Wi fi security

Basic security for communication

Privacy Authentication Integrity and non-RepudiationAvailability and Access Control

Page 9: Wi fi security

Privacy

ConfidentiallyThe intended recipients know what was being sent

but unintended parties cannot determine what was sent.

Required some encryption at the senderand required some decryption at the receiver

Page 10: Wi fi security

Authentication

Confirms the identity of the other party in the communication

Assures that The claimed sender is the actual senderThe claimed receiver is the actual receiver

Page 11: Wi fi security

Integrity and Non-repudiation

Data integrity Data is transmitted from source to destination without

undetected alterationNon- repudiation

Prove that a received message came from a claimed sender

Page 12: Wi fi security

Availability and Access Control

Ensure availability of resources for the intended users

Controls access to resource

Page 13: Wi fi security

Conclusions

Integration of three main wireless approachesPANWLANMobile communication

Security concepts PrivacyAuthenticationIntegrity and Non-repudiationAvailability and Access control

Page 14: Wi fi security

How to stay safe on public WiFi Networks...

Turn off all sharing

Computer Network Settings: Enable the Firewall

Security Browser Extensions

Consider Using a Virtual Private Network

Turn It Off When You're Not Using It

Keep Updating the Softwares

Page 15: Wi fi security

How to stay safe on public WiFi Networks...

The Risks of Social Networks

Page 16: Wi fi security
Page 17: Wi fi security

How to stay safe on public WiFi Networks...

Social Networking Security Threats

Page 20: Wi fi security

Assit.Prof. Chirasil ChayawanDirector

Communication and Integrated Services Study Center (CISS)KMUTT

[email protected]