wi fi security
TRANSCRIPT
IMPACTS OF WIFI SECURITYCASE STUDY OF SOCIAL NETWORKS
Assit.Prof. Chirasil ChayawanCommunication and Integrated Services Study Center
KMUTT
Main Technologies in Wireless
Proximity (Personal) area networkAd-hoc networkAlways connected in personal space
WLANMobile communication: 3G or beyondWLAN and mobile communication
InterconnectionDecoupling from terminal and applications from the
access methods
Integration of PAN, WLAN and Mobile communicationExtends users connectivityComplementary and hierarchical mannersUbiquitous wireless system
What is the weakest point in Wireless?
Wireless magnifies exposure vulnerabilityMobile device is
vulnerable to theft and lost.
Transmitted over the unprotected airwaves
Interoperability software: virus, hacking attacks
Wireless Vulnerability
Information going across the wireless link is exposed to anyone within radio range
The benefit of traditional wireline is the physical security
Mobile make it more…?
Difficult to establish trustDue to connection to physically hidden access pointCan service providers be trust in case of foreign networks?
System design issues
Mobile constraintsDesire low power consumption
Minimize computation Minimize network communication
By low processing capabilitiesBy limited link capacity
What mobile need?Cryptographic and other security algorithms to be simpleMinimize overhead for security protocol
Basic security for communication
Privacy Authentication Integrity and non-RepudiationAvailability and Access Control
Privacy
ConfidentiallyThe intended recipients know what was being sent
but unintended parties cannot determine what was sent.
Required some encryption at the senderand required some decryption at the receiver
Authentication
Confirms the identity of the other party in the communication
Assures that The claimed sender is the actual senderThe claimed receiver is the actual receiver
Integrity and Non-repudiation
Data integrity Data is transmitted from source to destination without
undetected alterationNon- repudiation
Prove that a received message came from a claimed sender
Availability and Access Control
Ensure availability of resources for the intended users
Controls access to resource
Conclusions
Integration of three main wireless approachesPANWLANMobile communication
Security concepts PrivacyAuthenticationIntegrity and Non-repudiationAvailability and Access control
How to stay safe on public WiFi Networks...
Turn off all sharing
Computer Network Settings: Enable the Firewall
Security Browser Extensions
Consider Using a Virtual Private Network
Turn It Off When You're Not Using It
Keep Updating the Softwares
How to stay safe on public WiFi Networks...
The Risks of Social Networks
How to stay safe on public WiFi Networks...
Social Networking Security Threats
Examples
http://www.forbes.com/2008/11/21/data-breaches-cybertheft-identity08-tech-cx_ag_1121breaches_slide.html
https://www.sans.org/reading-room/whitepapers/policyissues/reducing-risks-social-media-organization-33749
http://www.networkworld.com/news/2011/053111-social-media-security.html?page=1
Examples
http://www.sophos.com/en-us/security-news-trends/security-trends/social-networking-security-threats/protection-strategies.aspx
https://securityinabox.org/en/chapter_9_1
http://www.staysafeonline.org/stay-safe-online/protect-your-personal-information/social-networks
Assit.Prof. Chirasil ChayawanDirector
Communication and Integrated Services Study Center (CISS)KMUTT