The 7 Things I Know About Cyber Security After 25 Years | April 2024
Â
Wi fi security
1. IMPACTS OF WIFI SECURITY
CASE STUDY OF SOCIAL NETWORKS
Assit.Prof. Chirasil Chayawan
Communication and Integrated Services Study Center
KMUTT
2. Main Technologies in Wireless
Proximity (Personal) area network
ï‚« Ad-hoc network
ï‚« Always connected in personal space
WLAN
Mobile communication: 3G or beyond
WLAN and mobile communication
ï‚« Interconnection
ï‚« Decoupling from terminal and applications from the access methods
3. Integration of PAN, WLAN and Mobile communication
ï‚« Extends users connectivity
ï‚« Complementary and hierarchical manners
ï‚« Ubiquitous wireless system
4. What is the weakest point in Wireless?
Wireless magnifies exposure
vulnerability
ï‚« Mobile device is vulnerable to
theft and lost.
ï‚« Transmitted over the
unprotected airwaves
ï‚« Interoperability software: virus,
hacking attacks
6. Mobile make it more…?
Difficult to establish trust
ï‚« Due to connection to physically hidden access point
ï‚« Can service providers be trust in case of foreign networks?
7. System design issues
Mobile constraints
ï‚« Desire low power consumption
 Minimize computation
 Minimize network communication
ï‚« By low processing capabilities
ï‚« By limited link capacity
What mobile need?
ï‚« Cryptographic and other security algorithms to be simple
ï‚« Minimize overhead for security protocol
8. Basic security for communication
Privacy
Authentication
Integrity and non-Repudiation
Availability and Access Control
9. Privacy
Confidentially
The intended recipients know what was being sent but
unintended parties cannot determine what was sent.
Required some encryption at the sender
and required some decryption at the receiver
10. Authentication
Confirms the identity of the other party in the communication
Assures that
ï‚« The claimed sender is the actual sender
ï‚« The claimed receiver is the actual receiver
11. Integrity and Non-repudiation
Data integrity
ï‚« Data is transmitted from source to destination without undetected alteration
Non- repudiation
ï‚« Prove that a received message came from a claimed sender
12. Availability and Access Control
Ensure availability of resources
for the intended users
Controls access to resource
13. Conclusions
Integration of three main wireless approaches
ï‚« PAN
ï‚« WLAN
ï‚« Mobile communication
Security concepts
ï‚« Privacy
ï‚« Authentication
ï‚« Integrity and Non-repudiation
ï‚« Availability and Access control
14. How to stay safe on public WiFi
Networks...
Turn off all sharing
Computer Network Settings: Enable the Firewall
Security Browser Extensions
Consider Using a Virtual Private Network
Turn It Off When You're Not Using It
Keep Updating the Softwares
15. How to stay safe on public WiFi
Networks...
The Risks of Social Networks
16.
17. How to stay safe on public WiFi
Networks...
Social Networking Security Threats