Your SlideShare is downloading. ×
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Privacy in Wireless Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Privacy in Wireless Networks

2,590

Published on

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,590
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
65
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Privacy in Wireless Networks Keeping your private data private
  • 2. About Me
    • 7 years in IT Security
    • Principal Investigator for SIG 2 SoHo Honeypot project
    • Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University
    • Maintaining several personal websites
      • http://proxy.11a.nu
      • http:// www.securitytinker.com
  • 3. Agenda
    • Threats to your privacy
    • Technical solutions how to keep your data private
  • 4. Who are we protecting our privacy from?
    • Individuals
    • Corporations
    • Governments
  • 5. Attacks against wireless networks
    • Data interception
    • Man-in-the-middle attacks
    • Fake access points
  • 6. Sniffing the air
    • Interception of
      • Email
      • Instant Messaging
      • Web Surfing
  • 7. Anonymous Internet Access The How-To Guide
  • 8. Surfing with SSL
    • Any website using SSL is safe from prying eyes
      • Make sure that SSL certificate validates
      • Be aware of mixed-content sites
  • 9. Verify SSL usage in the browser
  • 10. Using VPN
    • Running your own VPN at home-office
    • Commercial VPN providers
  • 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  • 12. TOR - The Onion Router
    • History
    • How It works
    • Pitfalls
  • 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 16. Summary
    • Your data can easily be intercepted
    • Protect yourself using
      • SSL enabled websites
      • VPN tunnels
      • TOR Networks
      • Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
  • 17. Questions & Answers
    • Slides @ www.securitytinker.com
    • Mail @ [email_address]
    • These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
  • 18. THANK YOU!

×