SlideShare a Scribd company logo
1 of 16
ART 315 LECTURE 11
Richard Hamilton, Just What Is It That Makes Today’s Homes
So Different, So Appealing,
1956
Jasper Johns, Three Flags, 1958
Jasper Johns, Target, 1958
Robert Rauschenberg, Black Market,
1961
Robert Rauschenberg, Axle, 1964
James Rosenquist, Horse Blinders, 1968
Allan Kaprow, Baby, 1957
Tom Wesselman, Great American Still Life No. 2, 1961
Roy Lichtenstein, Wham!, 1963
Andy Warhol, Triple Elvis, 1962
Andy Warhol, Silver Disaster, 1963
Andy Warhol, Twenty-Five Colored
Marilyns, 1962
Andy Warhol, Campbell Soup Cans, 1962
Robert Rauschenberg, Monogram, 1955-59
Jasper Johns, Painted Bronze II (Ale Cans), 1964
Claes Oldenberg, The Store, 1962
Nam June Paik, Piano Intégral, 1958-59
John Cage, 4’ 33”, 1952
John Cage, 4’ 33”, 1952
John Cage, 4’ 33”, 1952
Allan Kaprow, Yard, 1961
George Maciunas, Flux Kit, 1964
Nam June Paik, Zen for Head, 1962
Joseph Beuys, I Like America and America Likes Me, 1974
Conquering the Minefield of
Soft Rogue APs in the Enterprise
A Whitepaper by AirTight Networks
www.airtightnetworks.com
© 2010 AirTight Networks, Inc
2/6
www.airtightnetworks.com
Conquering the Minefield of Soft Rogue APs in the Enterprise
Dr. Hemant Chaskar
Director of Technology, AirTight Networks
Overview
A soft access point (AP) is a laptop or other wireless enabled
device which
performs traffic forwarding between its wireless interface and
some other interface
which is connected to the secure network. A soft AP can show
up as rogue access
point on the enterprise network. This can happen inadvertently,
for example, when
an employee has used a company owned laptop as an AP to
share Internet
connection at home and later forgets to disable the sharing. A
soft AP can,
however, be maliciously installed as it is perfect hacker
“solution” to put a rogue AP
on a network while evading wire-side controls such as 802.1x,
NACs and wireside-
only rogue AP scanners.
Recently, soft APs increasingly have been found in enterprise
networks. One main
reason behind this is the ease with which end user devices
enable soft AP
configuration on embedded WiFi interfaces. In most cases, only
couple of clicks is
what it takes to enable soft AP on the end user device. Notably,
while conventional
rogue APs required bringing in unmanaged hardware such as
home grade WiFi
router into the enterprise, soft APs are embedded already in the
end user devices.
This paper reviews some of the commonly found ways to
convert WiFi enabled
devices into soft APs. Here Windows OS is used as example,
but similar
configurations can also be done on many end user devices
including the handheld
devices such as PDAs and smart phones. The paper also
suggests what steps you
can take to protect your network from soft AP threats.
© 2010 AirTight Networks, Inc
3/6
www.airtightnetworks.com
Commonly Found Soft AP Configurations
The following are some commonly found soft AP
configurations.
1. Windows Network Bridge:
A network bridge can be created between the wired Ethernet
interface and the
wireless WiFi interface of a Windows laptop. If the wired
Ethernet interface is
connected to the enterprise network, the network can be
accessed by intruders
from outside of premises who connect wirelessly to the WiFi
interface. The
intruders will have layer 2 access to the enterprise network.
2. Internet Connection Sharing (ICS):
© 2010 AirTight Networks, Inc
4/6
www.airtightnetworks.com
When Internet Connection Sharing (ICS) is enabled on a
Windows laptop, a routing
(NAT) service is created between its wired Ethernet interface
and wireless WiFi
interface. If the wired Ethernet interface is connected to
enterprise network, the
network can be accessed by an intruder from outside of the
premises by wirelessly
connecting to the WiFi interface. The intruder will have layer 3
access to the
enterprise network.
3. Add-on Devices on Laptop:
External devices can be connected to the laptop to turn it into a
soft AP. For
example, USB devices such as Windy31 and PCMCIA cards
such as WP1200, are
available and can act as wireless access points when plugged
into the laptop.
Devices such as Windy31 also come built in with AP software
which auto-installs
when the device is plugged into the laptop. The WiFi AP
running on such devices
can bridge or route traffic to the wired network through the
laptop.
Windy31
4. Virtual WiFi Interfaces (Windows 7):
Windows 7 has introduced the virtual WiFi interfaces feature.
This feature enables
a single radio interface on the device to act as multiple WiFi
devices
simultaneously. Software tools such as “connectify” are
available to enable both
client and AP simultaneously on the radio interface of the
Windows 7 laptop. If
such radio interface is connected to enterprise network as
authorized corporate
© 2010 AirTight Networks, Inc
5/6
www.airtightnetworks.com
WiFi client, unauthorized users from outside of the premises
can connect to the AP
operating on the same radio interface and then access the
enterprise network.
Soft APs on Handheld Devices
The virtual interfaces mark a significant development as they
extend soft AP threat
from laptops to handheld devices. The handheld devices
typically do not have
wired Ethernet interface, so the first three methods are
generally not applicable to
them. However, with the advent of virtual interfaces, it is now
possible to use a
WiFi radio in the handheld device to simultaneously act as
authorized corporate
WiFi client and unauthorized soft WiFi AP.
© 2010 AirTight Networks, Inc
6/6
www.airtightnetworks.com
Protection from Soft APs
Since it is so easy to convert end user laptops and WiFi enabled
handheld devices
into soft rogue APs, enterprises need to be continuously
monitoring to understand
if any soft APs are present on their networks.
Monitoring for soft APs requires wireless scanning tools such as
wireless intrusion
prevention system (WIPS) comprising of wireless monitoring
sensors. WIPS
sensors can continuously track the wireless activity of end user
devices and detect
soft AP activity. They can also block soft AP activity over the
air.
While there are many WIPS offerings available in the market, it
is essential to
evaluate if they can provide protection against all scenarios of
soft APs, before
installing them in your network. AirTight Networks offers
SpectraGuard® Enterprise
overlay WIPS which is capable of protecting against all types of
soft AP activity due
to its unique active classification™ technology enabled by
patented marker packet
techniques. It is also worth noting that WIPS also provides
protection from many
other WiFi threats such as conventional rogue APs, mis-
associations, ad hoc
connections, WiPhishing, wireless DoS attacks etc. (which are
not discussed in this
paper), helps meet compliance requirements (e.g., PCI, HIPAA
etc.), and also
provides performance monitoring and troubleshooting for the
WLAN.
For more information on WiFi security, WIPS and AirTight
Networks, please visit
www.airtightnetworks.com. You can also review recorded
webinar on this topic of
soft rogue APs at
https://admin.acrobat.com/_a1013426351/p54357857/.
SpectraGuard® Enterprise
Wireless Intrusion Prevention
System
Internet
Firewall
Sensor
ART 315 LECTURE 10
Jackson Pollock, Guardians of the Secret, 1943
Jackson Pollock, Mural, 1943
Jackson Pollock, One: Number 31, 1950
Jackson Pollock, Search, 1955
Willem de Kooning, Painting, 1948
Willem de Kooning, Woman I, 1950-52
Franz Kline, New York, New York, 1953
Arshile Gorky, The Liver is the Cock’s Comb, 1944
Clyfford Still, Painting, 1951
Hans Hofmann, Veluti in
Speculum, 1962
Cy Twombly, Untitled, 1968
Cy Twombly, Untitled (Roma), 1962
Morris Louis, KSI, 1959
Barnett Newman, Vir Heroicus Sublimis, 1950/51
Mark Rothko, White Cloud Over Purple, 1957
Ad Reinhardt, Abstract Painting Blue, 1952
Yves Klein, Monochrome Blue IKB 48),
1956
Lucio Fontana, Spatial Concept: Marriage in Venice, 1960/61
David Smith, Cubi XVIII2-4, 1964
David Smith, Blackburn—Song of an Irish Blacksmith, 1949
Barnett Newman, Broken Obelisk, 1963-67
John Chamberlain, Colonel Splendid, 1964
Mark DiSuvero, Che Faro Senza Euridici, 1959/60

More Related Content

Similar to ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...PROIDEA
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxmahendrarm2112
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseAirTight Networks
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing BotBellaj Badr
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifiAnil Pokhrel
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technologysai kumar R
 

Similar to ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx (20)

Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
WIFI TECHNOLOGY
WIFI TECHNOLOGYWIFI TECHNOLOGY
WIFI TECHNOLOGY
 
Hotspot!
Hotspot!Hotspot!
Hotspot!
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wi fi network
Wi fi networkWi fi network
Wi fi network
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
CONFidence2015: The (Io)Things you don't even need to hack. Should we worry? ...
 
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptxDISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
DISCOVERING PUBLIC Wi-Fi VULNERABILITIES USING RASBERRY PI AND.pptx
 
Wi fi[1]
Wi  fi[1]Wi  fi[1]
Wi fi[1]
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Gi-Fi Technology
Gi-Fi TechnologyGi-Fi Technology
Gi-Fi Technology
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
3
33
3
 
Computer network wifi
Computer network wifiComputer network wifi
Computer network wifi
 
wi-fi technology
 wi-fi technology wi-fi technology
wi-fi technology
 
15
1515
15
 
Wi fi
Wi fiWi fi
Wi fi
 

More from festockton

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxfestockton
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxfestockton
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxfestockton
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxfestockton
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxfestockton
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxfestockton
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxfestockton
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxfestockton
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxfestockton
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxfestockton
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxfestockton
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxfestockton
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxfestockton
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxfestockton
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxfestockton
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxfestockton
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxfestockton
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxfestockton
 

More from festockton (20)

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docx
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docx
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docx
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docx
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docx
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docx
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docx
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docx
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docx
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docx
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docx
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docx
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

ART 315 LECTURE 11Richard Hamilton, Just What Is It Th.docx

  • 1. ART 315 LECTURE 11 Richard Hamilton, Just What Is It That Makes Today’s Homes So Different, So Appealing, 1956 Jasper Johns, Three Flags, 1958 Jasper Johns, Target, 1958 Robert Rauschenberg, Black Market, 1961 Robert Rauschenberg, Axle, 1964 James Rosenquist, Horse Blinders, 1968 Allan Kaprow, Baby, 1957
  • 2. Tom Wesselman, Great American Still Life No. 2, 1961 Roy Lichtenstein, Wham!, 1963 Andy Warhol, Triple Elvis, 1962 Andy Warhol, Silver Disaster, 1963 Andy Warhol, Twenty-Five Colored Marilyns, 1962 Andy Warhol, Campbell Soup Cans, 1962 Robert Rauschenberg, Monogram, 1955-59 Jasper Johns, Painted Bronze II (Ale Cans), 1964
  • 3. Claes Oldenberg, The Store, 1962 Nam June Paik, Piano Intégral, 1958-59 John Cage, 4’ 33”, 1952 John Cage, 4’ 33”, 1952 John Cage, 4’ 33”, 1952 Allan Kaprow, Yard, 1961 George Maciunas, Flux Kit, 1964 Nam June Paik, Zen for Head, 1962 Joseph Beuys, I Like America and America Likes Me, 1974
  • 4. Conquering the Minefield of Soft Rogue APs in the Enterprise A Whitepaper by AirTight Networks www.airtightnetworks.com © 2010 AirTight Networks, Inc 2/6 www.airtightnetworks.com Conquering the Minefield of Soft Rogue APs in the Enterprise Dr. Hemant Chaskar Director of Technology, AirTight Networks Overview A soft access point (AP) is a laptop or other wireless enabled device which
  • 5. performs traffic forwarding between its wireless interface and some other interface which is connected to the secure network. A soft AP can show up as rogue access point on the enterprise network. This can happen inadvertently, for example, when an employee has used a company owned laptop as an AP to share Internet connection at home and later forgets to disable the sharing. A soft AP can, however, be maliciously installed as it is perfect hacker “solution” to put a rogue AP on a network while evading wire-side controls such as 802.1x, NACs and wireside- only rogue AP scanners. Recently, soft APs increasingly have been found in enterprise networks. One main reason behind this is the ease with which end user devices enable soft AP configuration on embedded WiFi interfaces. In most cases, only couple of clicks is what it takes to enable soft AP on the end user device. Notably, while conventional rogue APs required bringing in unmanaged hardware such as
  • 6. home grade WiFi router into the enterprise, soft APs are embedded already in the end user devices. This paper reviews some of the commonly found ways to convert WiFi enabled devices into soft APs. Here Windows OS is used as example, but similar configurations can also be done on many end user devices including the handheld devices such as PDAs and smart phones. The paper also suggests what steps you can take to protect your network from soft AP threats. © 2010 AirTight Networks, Inc 3/6 www.airtightnetworks.com Commonly Found Soft AP Configurations The following are some commonly found soft AP configurations. 1. Windows Network Bridge:
  • 7. A network bridge can be created between the wired Ethernet interface and the wireless WiFi interface of a Windows laptop. If the wired Ethernet interface is connected to the enterprise network, the network can be accessed by intruders from outside of premises who connect wirelessly to the WiFi interface. The intruders will have layer 2 access to the enterprise network. 2. Internet Connection Sharing (ICS): © 2010 AirTight Networks, Inc 4/6
  • 8. www.airtightnetworks.com When Internet Connection Sharing (ICS) is enabled on a Windows laptop, a routing (NAT) service is created between its wired Ethernet interface and wireless WiFi interface. If the wired Ethernet interface is connected to enterprise network, the network can be accessed by an intruder from outside of the premises by wirelessly connecting to the WiFi interface. The intruder will have layer 3 access to the enterprise network. 3. Add-on Devices on Laptop: External devices can be connected to the laptop to turn it into a soft AP. For example, USB devices such as Windy31 and PCMCIA cards such as WP1200, are available and can act as wireless access points when plugged into the laptop. Devices such as Windy31 also come built in with AP software which auto-installs when the device is plugged into the laptop. The WiFi AP
  • 9. running on such devices can bridge or route traffic to the wired network through the laptop. Windy31 4. Virtual WiFi Interfaces (Windows 7): Windows 7 has introduced the virtual WiFi interfaces feature. This feature enables a single radio interface on the device to act as multiple WiFi devices simultaneously. Software tools such as “connectify” are available to enable both client and AP simultaneously on the radio interface of the Windows 7 laptop. If such radio interface is connected to enterprise network as authorized corporate © 2010 AirTight Networks, Inc 5/6 www.airtightnetworks.com WiFi client, unauthorized users from outside of the premises
  • 10. can connect to the AP operating on the same radio interface and then access the enterprise network. Soft APs on Handheld Devices The virtual interfaces mark a significant development as they extend soft AP threat from laptops to handheld devices. The handheld devices typically do not have wired Ethernet interface, so the first three methods are generally not applicable to them. However, with the advent of virtual interfaces, it is now possible to use a WiFi radio in the handheld device to simultaneously act as authorized corporate WiFi client and unauthorized soft WiFi AP.
  • 11. © 2010 AirTight Networks, Inc 6/6 www.airtightnetworks.com Protection from Soft APs Since it is so easy to convert end user laptops and WiFi enabled handheld devices into soft rogue APs, enterprises need to be continuously monitoring to understand if any soft APs are present on their networks. Monitoring for soft APs requires wireless scanning tools such as wireless intrusion prevention system (WIPS) comprising of wireless monitoring sensors. WIPS sensors can continuously track the wireless activity of end user devices and detect soft AP activity. They can also block soft AP activity over the air.
  • 12. While there are many WIPS offerings available in the market, it is essential to evaluate if they can provide protection against all scenarios of soft APs, before installing them in your network. AirTight Networks offers SpectraGuard® Enterprise overlay WIPS which is capable of protecting against all types of soft AP activity due to its unique active classification™ technology enabled by patented marker packet techniques. It is also worth noting that WIPS also provides protection from many other WiFi threats such as conventional rogue APs, mis- associations, ad hoc connections, WiPhishing, wireless DoS attacks etc. (which are not discussed in this paper), helps meet compliance requirements (e.g., PCI, HIPAA etc.), and also
  • 13. provides performance monitoring and troubleshooting for the WLAN. For more information on WiFi security, WIPS and AirTight Networks, please visit www.airtightnetworks.com. You can also review recorded webinar on this topic of soft rogue APs at https://admin.acrobat.com/_a1013426351/p54357857/. SpectraGuard® Enterprise Wireless Intrusion Prevention System Internet Firewall Sensor ART 315 LECTURE 10 Jackson Pollock, Guardians of the Secret, 1943 Jackson Pollock, Mural, 1943
  • 14. Jackson Pollock, One: Number 31, 1950 Jackson Pollock, Search, 1955 Willem de Kooning, Painting, 1948 Willem de Kooning, Woman I, 1950-52 Franz Kline, New York, New York, 1953 Arshile Gorky, The Liver is the Cock’s Comb, 1944 Clyfford Still, Painting, 1951 Hans Hofmann, Veluti in Speculum, 1962 Cy Twombly, Untitled, 1968
  • 15. Cy Twombly, Untitled (Roma), 1962 Morris Louis, KSI, 1959 Barnett Newman, Vir Heroicus Sublimis, 1950/51 Mark Rothko, White Cloud Over Purple, 1957 Ad Reinhardt, Abstract Painting Blue, 1952 Yves Klein, Monochrome Blue IKB 48), 1956 Lucio Fontana, Spatial Concept: Marriage in Venice, 1960/61 David Smith, Cubi XVIII2-4, 1964
  • 16. David Smith, Blackburn—Song of an Irish Blacksmith, 1949 Barnett Newman, Broken Obelisk, 1963-67 John Chamberlain, Colonel Splendid, 1964 Mark DiSuvero, Che Faro Senza Euridici, 1959/60