1. IMPACTS OF WIFI SECURITY
CASE STUDY OF SOCIAL NETWORKS
Assit.Prof. Chirasil Chayawan
Communication and Integrated Services Study Center
KMUTT
2. Main Technologies in Wireless
Proximity (Personal) area network
Ad-hoc network
Always connected in personal space
WLAN
Mobile communication: 3G or beyond
WLAN and mobile communication
Interconnection
Decoupling from terminal and applications from the access methods
3. Integration of PAN, WLAN and Mobile communication
Extends users connectivity
Complementary and hierarchical manners
Ubiquitous wireless system
4. What is the weakest point in Wireless?
Wireless magnifies exposure
vulnerability
Mobile device is vulnerable to
theft and lost.
Transmitted over the
unprotected airwaves
Interoperability software: virus,
hacking attacks
5. Wireless Vulnerability
Information going across the wireless link is exposed to anyone within
radio range
The benefit of traditional wireline is the physical security
6. Mobile make it more…?
Difficult to establish trust
Due to connection to physically hidden access point
Can service providers be trust in case of foreign networks?
7. System design issues
Mobile constraints
Desire low power consumption
Minimize computation
Minimize network communication
By low processing capabilities
By limited link capacity
What mobile need?
Cryptographic and other security algorithms to be simple
Minimize overhead for security protocol
8. Basic security for communication
Privacy
Authentication
Integrity and non-Repudiation
Availability and Access Control
9. Privacy
Confidentially
The intended recipients know what was being sent but
unintended parties cannot determine what was sent.
Required some encryption at the sender
and required some decryption at the receiver
10. Authentication
Confirms the identity of the other party in the communication
Assures that
The claimed sender is the actual sender
The claimed receiver is the actual receiver
11. Integrity and Non-repudiation
Data integrity
Data is transmitted from source to destination without undetected alteration
Non- repudiation
Prove that a received message came from a claimed sender
12. Availability and Access Control
Ensure availability of resources
for the intended users
Controls access to resource
13. Conclusions
Integration of three main wireless approaches
PAN
WLAN
Mobile communication
Security concepts
Privacy
Authentication
Integrity and Non-repudiation
Availability and Access control
14. How to stay safe on public WiFi
Networks...
Turn off all sharing
Computer Network Settings: Enable the Firewall
Security Browser Extensions
Consider Using a Virtual Private Network
Turn It Off When You're Not Using It
Keep Updating the Softwares
15. How to stay safe on public WiFi
Networks...
The Risks of Social Networks
16.
17. How to stay safe on public WiFi
Networks...
Social Networking Security Threats