This document summarizes a training session on wireless security and wardriving. The session objectives are to explain wireless technology, standards, authentication processes, wardriving, and wireless hacking tools. It describes the basic components of a wireless network including access points, which connect the wireless and wired networks, and wireless network interface cards in devices. It also covers wireless network configuration options and standards like the 802.11 standard for wireless connectivity within local area networks.
An ad hoc network connects two or more devices directly without a wireless access point for quick data exchanges or multiplayer gaming. Cordless mice transmit data via infrared radiation or radio signals to a receiver connected to the computer via USB or built-in. Wireless keyboards use either infrared light waves or radio frequencies from 27MHz to 2.4GHz to communicate with devices, with most modern keyboards using 2.4GHz radio signals.
Using IEEE's Zigbee Protocol to design a low power, noise efficient node for home automation. The presentation provides some of the key ingredients and working modes for the Zigbee Protocol. Many companies like (DiGi) built smart zigbee radios (commercially named: XBee) based on these protocol stacks, which now help reshaping wireless sensor networking and low power consumer electronics integration .
This presentation introduces Bluetooth technology. It is comprised of four group members and discusses Bluetooth's features such as short-range wireless communication, security, and growth. The presentation also covers Bluetooth applications, how devices connect and communicate via Bluetooth, advantages and disadvantages, and examples of Bluetooth-enabled devices. Zigbee technology is then introduced as a standard for low data rate wireless devices with long battery life that is well-suited for home and building automation.
Zigbee technology and its application inIJCNCJournal
Wireless home automation systems have drawn considerable attentions of the researchers for more than a
decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,
Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular
because of its low cost and low power consumption. In this paper ZigBee based wireless home automation
systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of
the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless
home automation system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future opportunities
and challenges of the ZigBee based systems have been listed in this paper.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
The document discusses Zigbee wireless networks and Wireless Sensor Networks (WSNs). It provides details on:
1) What a WSN is and its applications in monitoring and controlling environments.
2) The technology requirements for WSNs including low cost, small size, low power consumption, and operating in unlicensed radio bands.
3) Standards for WSNs including IEEE 802.15.4, Zigbee, Bluetooth, and WiFi and their differences in features.
An ad hoc network connects two or more devices directly without a wireless access point for quick data exchanges or multiplayer gaming. Cordless mice transmit data via infrared radiation or radio signals to a receiver connected to the computer via USB or built-in. Wireless keyboards use either infrared light waves or radio frequencies from 27MHz to 2.4GHz to communicate with devices, with most modern keyboards using 2.4GHz radio signals.
Using IEEE's Zigbee Protocol to design a low power, noise efficient node for home automation. The presentation provides some of the key ingredients and working modes for the Zigbee Protocol. Many companies like (DiGi) built smart zigbee radios (commercially named: XBee) based on these protocol stacks, which now help reshaping wireless sensor networking and low power consumer electronics integration .
This presentation introduces Bluetooth technology. It is comprised of four group members and discusses Bluetooth's features such as short-range wireless communication, security, and growth. The presentation also covers Bluetooth applications, how devices connect and communicate via Bluetooth, advantages and disadvantages, and examples of Bluetooth-enabled devices. Zigbee technology is then introduced as a standard for low data rate wireless devices with long battery life that is well-suited for home and building automation.
Zigbee technology and its application inIJCNCJournal
Wireless home automation systems have drawn considerable attentions of the researchers for more than a
decade. The major technologies used to implement these systems include Z-Wave, Insteon, Wavenis,
Bluetooth, WiFi, and ZigBee. Among these technologies the ZigBee based systems have become very popular
because of its low cost and low power consumption. In this paper ZigBee based wireless home automation
systems have been addressed. There are two main parts of this paper. In the first part a brief introduction of
the ZigBee technology has been presented and in the second part a survey work on the ZigBee based wireless
home automation system has been presented. The performances of the ZigBee based systems have also been
compared with those of other competing technologies based systems. In addition some future opportunities
and challenges of the ZigBee based systems have been listed in this paper.
The document discusses Zigbee wireless communication networks. It provides an overview of Zigbee, including the basics of the underlying 802.15.4 standard. The presentation covers the architecture of Zigbee networks, including the different device types, layers of the protocol stack, and application profiles. Examples of applications of Zigbee technology are also discussed, along with technical trends such as improved power management and interoperability standards.
Wireless Communication And Mobile Network - ZigBeeXaver Y.R. Chen
The document discusses Zigbee wireless networks and Wireless Sensor Networks (WSNs). It provides details on:
1) What a WSN is and its applications in monitoring and controlling environments.
2) The technology requirements for WSNs including low cost, small size, low power consumption, and operating in unlicensed radio bands.
3) Standards for WSNs including IEEE 802.15.4, Zigbee, Bluetooth, and WiFi and their differences in features.
The Differences of between ZigBee and Bluetooth technologiesCan KAYA
ZigBee and Bluetooth are wireless network technologies but they have key differences. ZigBee is intended for low data rate, long battery life applications like sensor networks and home automation. It has a range of 10-100m, very low power consumption, supports large networks, and a long battery life. Bluetooth is intended for cable replacement between devices like phones, laptops, and headsets within 10m. It has higher data rates but also higher power consumption and shorter battery life than ZigBee.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
The document presents information on ZigBee, a wireless networking standard. ZigBee is designed for low-cost, low-power wireless mesh networks for applications like wireless light switches, sensors, and industrial equipment. It operates on frequencies of 2.4GHz, 915MHz, and 868MHz and can transmit data at rates up to 250kbps. ZigBee networks consist of coordinator devices, router devices, and low-cost end devices and use 128-bit encryption for security. The standard supports mesh networking and is useful for applications requiring low data rates and long battery life.
This document presents a project proposal for a short-distance wireless voice communication system using ZigBee sensors. The objectives are to implement a handheld device for voice communication using ZigBee. It describes the ZigBee technology, provides a block diagram of the transmitter and receiver components, and outlines the advantages as low cost, high capacity, reliability and security. It presents a timeline for the project in 5 phases over 12 months and estimates the total project cost to be around $23,200.
This document provides an overview of Bluetooth and Zigbee wireless technologies. It discusses Bluetooth standards, classes, software, and applications. Bluetooth was developed in 1994 and operates at 2.45GHz using frequency hopping. Zigbee was created for low-power wireless sensor and control networks. It has a layered architecture based on the IEEE 802.15.4 standard and supports three device types: coordinator, full function device, and reduced function device. The document compares Zigbee to Bluetooth and other wireless protocols, outlines Zigbee characteristics and applications, and concludes that Zigbee will likely be the basis for future home networking solutions.
Wi-Fi technology uses radio waves to transmit and receive data wirelessly. It uses standards such as 802.11b, 802.11a, and 802.11g. A Wi-Fi network consists of access points that broadcast a wireless signal to connect devices like computers, phones and tablets. Security measures for Wi-Fi include encrypting data transmission and authenticating users and servers to prevent eavesdropping, spoofing and denial of service attacks. Common configurations and applications of Wi-Fi include home and office networks, as well as use by travelers.
This document provides an overview of Zigbee wireless sensor networks. It discusses the introduction of Zigbee including its data rates up to 250 kbps, range of 10-75 meters, multi-level security, and battery life of up to 2 years. Applications of Zigbee are also presented. Several common attacks on Zigbee networks are described such as end-device sabotage, network key sniffing, replay, packet interception, and network discovery attacks. Countermeasures to these attacks including remote alerting systems, use of high security levels, intrusion detection systems, and timestamping mechanisms are proposed.
ZIGBEE TECHNOLOGY "Wireless Control That Simply Work"
Description & details about ZIGBEE TECHNOLOGY.
Seminar presentation submitted at Jaipur National University
by Sidhant Raj (ECE) & Yuvaraj (CSE).
ZigBee is an IEEE 802.15.4-based specification for personal area networks that uses low power wireless transmissions between devices. It was standardized in 2003 and revised in 2006. ZigBee networks can support up to 65,000 nodes and consume very low amounts of battery power. Common applications of ZigBee include wireless sensor networks, home automation and control, and medical data collection.
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139Premier Farnell
The document provides an overview of the JN5139 wireless microcontroller from Jennic Ltd. It has an IEEE 802.15.4 compliant transceiver and supports ZigBee applications. It features a 32-bit RISC processor, various peripherals including ADCs and timers, and low power characteristics making it suitable for wireless sensor networks and other applications. The document describes the microcontroller features and architecture, transceiver details, and JenNet protocol stack.
This document discusses Zigbee and its role in wireless sensor networks. It begins by describing how sensors have evolved from simple devices without computation or communication abilities, to sensor nodes that can process data and communicate wirelessly. It then introduces Zigbee as an important wireless communication standard developed for low data rate applications requiring long battery life. The document explains that Zigbee targets applications in areas like smart energy meters and home automation due to its low power consumption and cost. It compares Zigbee to other wireless standards like Bluetooth and Wi-Fi, noting that Zigbee is best suited for simple sensor applications. Examples of commercial Zigbee products are also provided.
ZigBee is a wireless technology standard developed for low-cost, low-power wireless networks for applications like home automation and industrial control. It uses small, low-power digital radios to form mesh networks that can self-heal and scale to thousands of devices. ZigBee networks are reliable, secure, and interoperable, allowing devices from different manufacturers to communicate. Common applications of ZigBee include smart energy, lighting controls, HVAC systems, medical devices, and more due to its ability to run for years on inexpensive batteries.
This document provides an overview of ZigBee wireless communication technology. It discusses the ZigBee protocol which is based on the IEEE 802.15.4 standard and adds network construction, security, and application services. The ZigBee Alliance develops the ZigBee specification and promotes its adoption. ZigBee is designed for low data rate, long battery life applications like home automation, lighting control, and sensor networks. It supports star, tree, and mesh network topologies operating in the 2.4GHz band with data rates up to 250kbps. The document outlines the physical, MAC and network layers of ZigBee and discusses security, topologies, and applications of the protocol.
The document discusses Aruba's mobility access switch product line, including the S3500, S2500, and S1500 switches. It provides an overview of the key capabilities and features of these switches such as role-based access control, integration with ClearPass policy manager for role downloads, and support for wired access points. The switches can be stacked and support tunneled traffic to Aruba's mobility controllers.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
Wi-Fi is a wireless technology that uses radio frequencies to transmit data through the air based on the 802.11 standard. Security for Wi-Fi networks has evolved from the basic WEP encryption to WPA and WPA2, which provide stronger encryption through the use of keys, authentication, and integrity checks. Additional security measures for Wi-Fi networks include blocking the SSID, changing default passwords, MAC filtering, firewalls, VPNs, and protocols like Kerberos that authenticate nodes and check for modifications to data.
Este documento proporciona una lista de restaurantes en el Valle del Jerte con su categoría, dirección, teléfono, número de plazas y precio del menú. En total se enumeran 21 restaurantes localizados en pueblos y parajes del Valle del Jerte como Torrejoncillo, Tornavacas, Jerte, Cabezuela del Valle, Navaconcejo, El Torno, Casas del Castañar y Piornal.
Para Luis Fernando Heras Portillo es muy importan el Turismo, ya que es un sector de gran importancia, ya que tiene la ventaja comparativa de sus valiosos recursos, cuenta con destacados destinos mundiales, y mantiene unas expectativas muy importantes de desarrollo.
Hablar de turismo implica hacer referencia no sólo a la actividad hotelera y toda su cadena de proveedores sino también al transporte, es especial al aéreo, las empresas de esparcimiento, los establecimientos gastronómicos y la infraestructura necesaria para hacer posible el desarrollo de toda esta actividad. Es todo un conjunto de empresas que generan oportunidades laborales.
The Differences of between ZigBee and Bluetooth technologiesCan KAYA
ZigBee and Bluetooth are wireless network technologies but they have key differences. ZigBee is intended for low data rate, long battery life applications like sensor networks and home automation. It has a range of 10-100m, very low power consumption, supports large networks, and a long battery life. Bluetooth is intended for cable replacement between devices like phones, laptops, and headsets within 10m. It has higher data rates but also higher power consumption and shorter battery life than ZigBee.
The document discusses ZigBee, a wireless technology standard for low-power wireless networks. ZigBee targets monitoring and control applications with low data rates and infrequent data transmissions from sensors and controllers. It operates on the IEEE 802.15.4 standard and forms mesh networks for reliability and range. The ZigBee Alliance has over 150 member companies working to enable interoperable, low-cost products based on the ZigBee standard across various market applications including home automation, lighting, HVAC, security, and industrial control.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
Zigbee is a wireless networking standard used for low-power digital radios in personal area networks. It uses small, low-power digital radios designed for use in wireless sensor and control networks. Zigbee devices include coordinators, routers, and end devices. Coordinators manage the network, routers relay data, and end devices can only communicate with their parent node. Zigbee uses mesh networking topologies to allow for redundancy and multiple communication paths. Its software architecture is built on top of the IEEE 802.15.4 standard and includes network, application, and device object layers. Zigbee networks are initialized by coordinators searching for channels and assigning PAN IDs to start the network for other devices
The document presents information on ZigBee, a wireless networking standard. ZigBee is designed for low-cost, low-power wireless mesh networks for applications like wireless light switches, sensors, and industrial equipment. It operates on frequencies of 2.4GHz, 915MHz, and 868MHz and can transmit data at rates up to 250kbps. ZigBee networks consist of coordinator devices, router devices, and low-cost end devices and use 128-bit encryption for security. The standard supports mesh networking and is useful for applications requiring low data rates and long battery life.
This document presents a project proposal for a short-distance wireless voice communication system using ZigBee sensors. The objectives are to implement a handheld device for voice communication using ZigBee. It describes the ZigBee technology, provides a block diagram of the transmitter and receiver components, and outlines the advantages as low cost, high capacity, reliability and security. It presents a timeline for the project in 5 phases over 12 months and estimates the total project cost to be around $23,200.
This document provides an overview of Bluetooth and Zigbee wireless technologies. It discusses Bluetooth standards, classes, software, and applications. Bluetooth was developed in 1994 and operates at 2.45GHz using frequency hopping. Zigbee was created for low-power wireless sensor and control networks. It has a layered architecture based on the IEEE 802.15.4 standard and supports three device types: coordinator, full function device, and reduced function device. The document compares Zigbee to Bluetooth and other wireless protocols, outlines Zigbee characteristics and applications, and concludes that Zigbee will likely be the basis for future home networking solutions.
Wi-Fi technology uses radio waves to transmit and receive data wirelessly. It uses standards such as 802.11b, 802.11a, and 802.11g. A Wi-Fi network consists of access points that broadcast a wireless signal to connect devices like computers, phones and tablets. Security measures for Wi-Fi include encrypting data transmission and authenticating users and servers to prevent eavesdropping, spoofing and denial of service attacks. Common configurations and applications of Wi-Fi include home and office networks, as well as use by travelers.
This document provides an overview of Zigbee wireless sensor networks. It discusses the introduction of Zigbee including its data rates up to 250 kbps, range of 10-75 meters, multi-level security, and battery life of up to 2 years. Applications of Zigbee are also presented. Several common attacks on Zigbee networks are described such as end-device sabotage, network key sniffing, replay, packet interception, and network discovery attacks. Countermeasures to these attacks including remote alerting systems, use of high security levels, intrusion detection systems, and timestamping mechanisms are proposed.
ZIGBEE TECHNOLOGY "Wireless Control That Simply Work"
Description & details about ZIGBEE TECHNOLOGY.
Seminar presentation submitted at Jaipur National University
by Sidhant Raj (ECE) & Yuvaraj (CSE).
ZigBee is an IEEE 802.15.4-based specification for personal area networks that uses low power wireless transmissions between devices. It was standardized in 2003 and revised in 2006. ZigBee networks can support up to 65,000 nodes and consume very low amounts of battery power. Common applications of ZigBee include wireless sensor networks, home automation and control, and medical data collection.
Wireless Microcontroller (IEEE802.15.4 and ZigBee): JN5139Premier Farnell
The document provides an overview of the JN5139 wireless microcontroller from Jennic Ltd. It has an IEEE 802.15.4 compliant transceiver and supports ZigBee applications. It features a 32-bit RISC processor, various peripherals including ADCs and timers, and low power characteristics making it suitable for wireless sensor networks and other applications. The document describes the microcontroller features and architecture, transceiver details, and JenNet protocol stack.
This document discusses Zigbee and its role in wireless sensor networks. It begins by describing how sensors have evolved from simple devices without computation or communication abilities, to sensor nodes that can process data and communicate wirelessly. It then introduces Zigbee as an important wireless communication standard developed for low data rate applications requiring long battery life. The document explains that Zigbee targets applications in areas like smart energy meters and home automation due to its low power consumption and cost. It compares Zigbee to other wireless standards like Bluetooth and Wi-Fi, noting that Zigbee is best suited for simple sensor applications. Examples of commercial Zigbee products are also provided.
ZigBee is a wireless technology standard developed for low-cost, low-power wireless networks for applications like home automation and industrial control. It uses small, low-power digital radios to form mesh networks that can self-heal and scale to thousands of devices. ZigBee networks are reliable, secure, and interoperable, allowing devices from different manufacturers to communicate. Common applications of ZigBee include smart energy, lighting controls, HVAC systems, medical devices, and more due to its ability to run for years on inexpensive batteries.
This document provides an overview of ZigBee wireless communication technology. It discusses the ZigBee protocol which is based on the IEEE 802.15.4 standard and adds network construction, security, and application services. The ZigBee Alliance develops the ZigBee specification and promotes its adoption. ZigBee is designed for low data rate, long battery life applications like home automation, lighting control, and sensor networks. It supports star, tree, and mesh network topologies operating in the 2.4GHz band with data rates up to 250kbps. The document outlines the physical, MAC and network layers of ZigBee and discusses security, topologies, and applications of the protocol.
The document discusses Aruba's mobility access switch product line, including the S3500, S2500, and S1500 switches. It provides an overview of the key capabilities and features of these switches such as role-based access control, integration with ClearPass policy manager for role downloads, and support for wired access points. The switches can be stacked and support tunneled traffic to Aruba's mobility controllers.
This seminar report provides an overview of ZigBee technology. It defines ZigBee as a wireless networking standard intended for low-power devices. The report outlines ZigBee's key characteristics including low cost, low power consumption, mesh networking topology, and built-in security. It also describes ZigBee's protocol stack and compares it to other wireless technologies like Bluetooth and Wi-Fi. Common applications of ZigBee technology include home automation, wireless sensor networks, and industrial control.
Wi-Fi is a wireless technology that uses radio frequencies to transmit data through the air based on the 802.11 standard. Security for Wi-Fi networks has evolved from the basic WEP encryption to WPA and WPA2, which provide stronger encryption through the use of keys, authentication, and integrity checks. Additional security measures for Wi-Fi networks include blocking the SSID, changing default passwords, MAC filtering, firewalls, VPNs, and protocols like Kerberos that authenticate nodes and check for modifications to data.
Este documento proporciona una lista de restaurantes en el Valle del Jerte con su categoría, dirección, teléfono, número de plazas y precio del menú. En total se enumeran 21 restaurantes localizados en pueblos y parajes del Valle del Jerte como Torrejoncillo, Tornavacas, Jerte, Cabezuela del Valle, Navaconcejo, El Torno, Casas del Castañar y Piornal.
Para Luis Fernando Heras Portillo es muy importan el Turismo, ya que es un sector de gran importancia, ya que tiene la ventaja comparativa de sus valiosos recursos, cuenta con destacados destinos mundiales, y mantiene unas expectativas muy importantes de desarrollo.
Hablar de turismo implica hacer referencia no sólo a la actividad hotelera y toda su cadena de proveedores sino también al transporte, es especial al aéreo, las empresas de esparcimiento, los establecimientos gastronómicos y la infraestructura necesaria para hacer posible el desarrollo de toda esta actividad. Es todo un conjunto de empresas que generan oportunidades laborales.
D'Licius Fruit es una empresa dedicada a ofrecer productos de alta calidad como ensaladas de frutas, helados, batidos de frutas, pinchos de frutas y sándwiches de pollo. Su misión es satisfacer las necesidades de los clientes con buenos productos y servicio. Su visión es ser líder reconocido en el mercado nacional por su innovación y calidad.
This document provides information about various events organized by International Money Express (IME). It discusses IME's annual dinner in 2013 where awards were given out to top performing staff. It also talks about IME's management training program on leadership and report writing skills. Another event mentioned is IME participating in a paintball competition organized by Maybank. IME organizing football tournaments for migrant workers from different countries on weekends is also summarized. The document then provides details on various staff training programs conducted by IME's Risk and Compliance Department. Travel of IME staff to places like Philippines and Vietnam is briefly covered as well. Information on rewards program launched by IME and MCB bank of Pakistan for top performing tellers is mentioned. The
Enrique Gonzalez version 2 open feb 1 with mario 2nd edition final 5 x 8 ...Steve McCrea
Enrique is the former principal of Frida Kahlo High, Nightingale Middle and Highland Park High in Los Angeles. His advocacy of kids, portfolios, projects ... the list is long. His series of "conversations with Enrique Gonzalez" produced by Erik Friedl have had some impact on YouTube. This book is a compilation of conversations with Enrique. You can contact him at egcg@me.com
Son objeto de convalidación los módulos profesionales de los ciclos formativos de Formación Profesional del sistema educativo, que se imparten en toda España y están regulados en los reales decretos por los que se establecen los títulos de Formación Profesional del sistema educativo.
Los requisitos generales para solicitar una convalidación son:
Matricularse en las enseñanzas que se pretenden convalidar.
Solicitarlo a la dirección del centro educativo donde se haya formalizado la matrícula.
Haber superado una formación con validez académica que incluya totalmente las capacidades terminales o resultados de aprendizaje y contenidos mínimos de los módulos profesionales de los ciclos formativos susceptibles de convalidación.
Siempre que exista normativa vigente a aplicar, estas convalidaciones debe resolverlas la dirección del centro educativo donde el/la solicitante se haya matriculado, en caso contrario, deben ser resueltas, de forma individualizada, por la Dirección General de Formación Profesional del Ministerio de Educación.
La Universidad Francisco de Vitoria apuesta por la formación integral de sus alumnos más allá de lo académico a través de herramientas como asesorías, idiomas, deporte, voluntariado y sociedades de alumnos. Para el próximo curso ofrecerá un nuevo Grado en Gastronomía Internacional y ha creado la UFV International Business School para facilitar el acceso al MBA de forma asequible.
La Divina Comedia de Dante Alighieri narra el viaje del poeta a través del Infierno, el Purgatorio y el Paraíso. A lo largo de su viaje, Dante encuentra muchos personajes históricos y de su época siendo castigados de acuerdo a sus pecados. El viaje representa el destino del alma humana según la teología escolástica, comenzando en la desesperación del Infierno, pasando por la esperanza del Purgatorio, hasta alcanzar la salvación en el Paraíso guiado por su
El documento habla sobre CSIRT-cv, el Centro de Seguridad TIC de la Comunitat Valenciana. Fue creado en 2007 como una iniciativa pionera en España para mejorar la seguridad en internet a nivel autonómico. Actualmente, CSIRT-cv trabaja para desarrollar medidas preventivas y reactivas que mitiguen incidentes de seguridad en sistemas de información en la Comunidad Valenciana, incluyendo la administración pública, PYMES y ciudadanos. El documento también proporciona datos de contacto para CSI
1. The document outlines Team Impuls's manifesto for making Eindhoven a more sustainable and livable city.
2. It discusses establishing an initiative to promote sustainability in Eindhoven in a business-like and results-oriented way, engaging citizens and enabling collaboration between businesses, citizens, and government.
3. Specific projects mentioned include installing solar panels, promoting sustainable transportation for students, and developing a sustainability certification program.
Convegno la mela nel mondo interpoma bz - 16-11-2012 4 - davide neriImage Line
This document discusses root growth and interaction with crop residues. It contains 3 main points:
1) It examines root growth cycles, absorption, and ecology as well as how organic matter from roots and plant residues can increase nutrient availability, reduce erosion and disease, and improve soil carbon levels.
2) It describes several experiments on root growth patterns in response to different crop residues and organic amendments, finding both positive and negative allelopathic effects on root development.
3) It discusses the potential for using organic wastes and amendments to support root growth and mitigate replant problems in apple orchards. Sustainable soil management techniques are highlighted.
Este documento presenta un proyecto cinematográfico llamado "Je t'aime Louis" dirigido por Iñaki Elizalde. El cortometraje trata sobre una familia y la vejez, especialmente la pérdida de uno de los padres. El documento invita a las personas interesadas en la cultura a convertirse en mecenas del proyecto, desgravando hasta un 80% de su inversión de hasta 150 euros en su declaración de impuestos. A cambio, los mecenas recibirán actualizaciones sobre el progreso del proyecto
Plano Diretor para Recomposição Florestal nas Bacias Hidrográficas PCJFlorespi
Este capítulo discute a microbacia hidrográfica como unidade básica para planejamento conservacionista, definindo-a como uma área de terra drenada por um curso d'água de até segunda ordem. Explica que a microbacia integra todos os componentes relacionados à qualidade e disponibilidade da água e deve ser usada como referência para projetos de controle de erosão e conservação de recursos hídricos. Também cita exemplos de programas que adotam essa escala e ressalta a importância do planejamento integrado
Este documento resume varias lluvias de meteoros que serán visibles desde El Salvador, incluyendo las Leónidas en noviembre, las Gemínidas en diciembre y las Ursidas a finales de diciembre. La observación de las Leónidas en 2006 produjo menos meteoros de lo esperado, con solo 2 meteoros avistados desde Nicaragua y un máximo de 100 por hora en España. Se espera que las Gemínidas en diciembre sean la mejor lluvia de meteoros del año con 70-100 meteoros por hora en condiciones óptimas.
Este seminario trata sobre el manejo de pacientes con accidente vascular cerebral (AVC). Define el AVC como una alteración súbita del flujo sanguíneo al cerebro que causa déficit neurológicos. Explica las causas más comunes, la patofisiología de la necrosis y área penumbra cerebral, la epidemiología, tratamiento, prevención, pronóstico y consideraciones para la atención odontológica de estos pacientes.
Semejanzas y difenrencias entre el correo postal y el correo webSimone Abi
El documento compara el correo postal tradicional con el correo electrónico, señalando que el correo postal requiere un proceso más largo que puede tomar días, usa papel, y requiere el pago de una tarifa, mientras que el correo electrónico es instantáneo, gratuito, y se transmite a través de redes de internet, pero también tiene el riesgo de correo no deseado. Ambos tipos de correo siguen siendo ampliamente utilizados y cumplen un papel importante en la comunicación moderna.
Operador Movil Virtual + Documentación requerida por la Comisión del Mercado de Telecomunicaciones de España para la solicitud de autorizaciones de explotación de redes y prestación de servicios
DaWanda is a marketplace for handmade goods based in Berlin, Germany. It has established itself as the largest marketplace for handmade goods in Europe and expanded to other European countries in 2012. It has 146 employees and shareholders include several venture capital firms. DaWanda generates revenue through commissions from sales on the site as well as listing and advertising fees. Key categories on the site include supplies, jewelry, and fashion. The target audience includes women ages 18-50 interested in individuality and crafting as well as designers ages 18-59 seeking to sell their products. Success comes from unique products, a strong social community, and engaging customers through multiple senses with workshops and markets.
Wireless networking allows devices to connect to a network without cables by using technologies like Wi-Fi, Bluetooth, and HomeRF. Common types of wireless networks include peer-to-peer networks connecting devices directly and infrastructure networks with an access point connecting devices to a larger network. Key components of setting up a wireless network include wireless adapters, access points, antennas, and configuring standards and security protocols like WEP, WPA, and MAC address filtering.
This is a ppt about the recent trends in tech and wireless communication. As the is good document to read we are requesting to study the wireless communal harmony and peace to you. Aster that I have a great day and I will be available from June to September to December to February to the same here to visit our frequently asked questions about HTML5.
And ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha Akshar cholk Thai ne na jato ko bhi 6 baje uthta hai ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye shikhar ki aur batao ki nai dunia epaper ab naye 5.
Wireless networks use radio waves to connect devices without cables. They integrate with wired networks through access points and allow mobility as users move between coverage areas. The 802.11 standards define the physical and data link layers for wireless LANs and include specifications like 802.11a, b, g which provide different speeds and frequencies. Security is important for wireless networks and features like WEP have known vulnerabilities. Careful planning of access point placement and antennas is needed for effective coverage.
Wireless lan electronics and communication engineeringeceb9198
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of WLAN fundamentals and network architecture, describing components like access points, distribution systems, and stations. It then summarizes the various 802.11 standards from 802.11 to 802.11ac, outlining their key features such as modulation schemes and data rates. The document also covers topics like WLAN security protocols, wireless hotspots, virtual private networks, and an alternative WLAN standard called HIPERLAN.
This lecture describes wireless communication networks, including their advantages and disadvantages, standards and operation, and setup. Wireless devices communicate using radio frequencies without cabling. A typical home wireless setup involves computers with wireless network interface cards, a wireless router to broadcast the network signal, and configuring wireless security like WPA2. The lecture also outlines the major components of network hardware, including networked devices, network interface cards, switches, routers, servers, and devices to protect networks from power issues.
Slides for a college course at City College San Francisco. Based on "Hands-On Ethical Hacking and Network Defense, Third Edition" by Michael T. Simpson, Kent Backman, and James Corley -- ISBN: 9781285454610.
Instructor: Sam Bowne
Class website: https://samsclass.info/123/123_S17.shtml
Wi-Fi is a wireless technology standard that allows electronic devices to connect to the internet or communicate with each other wirelessly. The presentation discusses Wi-Fi technologies like 802.11b, 802.11a, and 802.11g. It explains the basic components of a Wi-Fi network including access points, Wi-Fi cards, and security measures. It also covers Wi-Fi configurations, applications, security techniques and topologies like AP-based, peer-to-peer, and point-to-multipoint bridge.
This document provides an overview of wireless communication and networking. It defines wireless communication and discusses wireless network topologies and integration with wired networks. It describes the IEEE 802.11 wireless standards including 802.11a, 802.11b, 802.11g and 802.11n. It also discusses wireless networking devices such as access points, wireless LAN controllers, and bridges. Finally, it covers common wireless security measures including SSID hiding, MAC address filtering, static IP addressing, 802.1X authentication, WEP, WPA, and WPA2 encryption.
This document outlines the course objectives, syllabus, and outcomes for the course EC8702 Ad Hoc and Wireless Sensor Networks. The course aims to teach students about ad hoc network and sensor network fundamentals, routing protocols, sensor network architecture and design issues, transport layer and security issues, and sensor network platforms and tools. The syllabus covers topics like ad hoc network routing protocols, sensor network introductions and architectures, networking concepts and protocols, security issues, and sensor network platforms. Upon completing the course, students will gain knowledge of ad hoc and sensor networks and be able to apply this to identify suitable protocols and address issues in these networks.
The document discusses plans to implement a wireless network at Morrisville College Library to allow students with laptops to access library resources anywhere in the building. It describes the hardware used, including Cisco access points and wireless network cards, and the benefits of a wireless network for a laptop-focused student body. Case studies from other academic libraries that implemented wireless networks are also presented to demonstrate how wireless can enhance the library experience for mobile users.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs connect to wired networks through access points and allow mobility. The 802.11 standards including 802.11a, 802.11b, 802.11g, and 802.11e are described in terms of their data rates, frequencies used, and other characteristics. The document also covers wireless LAN security features like authentication, encryption, and integrity checking provided by Wired Equivalent Privacy (WEP) as well as problems with WEP security.
This document provides an overview of wireless networks and the IEEE 802.11 wireless LAN standards. It discusses how wireless LANs operate similarly to wired LANs but use radio waves instead of cables for the last link to users. Access points are used to bridge wireless traffic to a wired network backbone. The document also covers wireless topologies, standards such as 802.11a, 802.11b, 802.11g, and security features like WEP as well as their limitations. It provides guidance on planning a wireless LAN migration including access point placement and site surveys.
This document discusses wireless network security. It begins by outlining the security requirements of authentication, confidentiality, integrity, non-repudiation, availability, and detection/isolation. It then discusses threats to wireless networks like eavesdropping, denial of service attacks, and man-in-the-middle attacks. Finally, it outlines methods to secure wireless networks, including using encryption, changing default passwords, and implementing the 802.11i security standard to authenticate devices and securely transmit data through techniques like WPA2.
This document discusses networks, fog, and cloud computing in the context of IoT fundamentals. It describes how IoT devices connect to networks using various wireless technologies. It explains that fog computing processes data at the edge to reduce burden on networks while cloud computing provides scalable resources over the internet. It also addresses security and privacy concerns around the large amounts of data generated by IoT including storage, transmission, encryption, and device management.
This document provides an overview of wireless local area networks (WLANs). It discusses wireless technology and standards including 802.11, WLAN topologies, how they integrate with wired networks, security considerations, and performance comparisons between standards such as 802.11a, 802.11b, and 802.11g. Wireless LANs use radio waves to connect devices within a building and bridge to the wired network backbone. Standards specify protocols for authentication, encryption, and quality of service, though some early security features like WEP have proven vulnerable. Migration to wireless offers mobility but introduces new design challenges.
The document discusses fog networks and cloud computing in the context of an Internet of Things course. It covers the following key points:
- Fog networks refer to decentralized computing infrastructure located closer to IoT devices to help process some data locally instead of sending everything to the cloud. This helps address issues like latency.
- Cloud computing provides on-demand access to shared computing resources, allowing IoT systems to extend functionality by processing and storing data in the cloud.
- Common cloud service models for IoT include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Major cloud providers like Amazon AWS offer services tailored to IoT applications
Similar to Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY (20)
Karir dan Kompetensi Keamanan Siber RTIK Bali 28 Agustus 2020IGN MANTRA
1. Industri 4.0 dan keamanan siber merupakan cabang pohon teknologi informasi dan komunikasi yang sangat luas dengan peluang karir dan proyek yang masih terbuka.
2. Bisnis dan teknologi membutuhkan dukungan keamanan siber baik secara lokal maupun internasional untuk meningkatkan rasa aman dan nilai pasar.
3. Pengembangan karir dan kompetensi di bidang keamanan siber perlu didukung sejak pendidikan, pelati
2020 07-16 data security lokal-internet it up pancasilaIGN MANTRA
Tiga peristiwa kebocoran data besar terjadi pada tahun 2020 di Indonesia, yaitu data pengguna Tokopedia, Bukalapak, dan Bhinneka masing-masing sebanyak 15 juta, 13 juta, dan 12 juta pengguna. Kebocoran data juga terjadi pada instansi pemerintah seperti Kemendikbud dan beberapa perguruan tinggi. Ancaman kebocoran data semakin meningkat seiring dengan perkembangan teknologi. Untuk mencegahnya,
2020 07-02 cyber crime n data security-ign mantraIGN MANTRA
1. Dokumen tersebut membahas mengenai ancaman dan perlindungan data pribadi di era digital. Terdapat berbagai jenis ancaman seperti phishing, malware, kebocoran data, serta ketidakpatuhan terhadap peraturan perlindungan data seperti UU ITE, PDP, dan GDPR.
2. Untuk memitigasi risiko tersebut, dibutuhkan langkah-langkah keamanan seperti enkripsi data, otentikasi dua faktor, manajemen password yang
Webminar Keamanan Data dan Informasi Pendidikan di Industri 4.0 dan Society 5.0 IGN MANTRA
Ringkasan dokumen:
Seminar online membahas tren ancaman keamanan siber pada tahun 2020 dan cara menanggulanginya. Terjadi peningkatan insiden kebocoran data besar-besaran dari perusahaan teknologi dan pemerintah di Indonesia pada tahun 2020. Masyarakat Indonesia perlu memperkuat keamanan siber untuk mendukung transisi menuju Society 5.0.
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
The document discusses incident response and handling. It outlines the incident response process including preparation, identification, containment, eradication, recovery, and lessons learned. It also discusses the attacker's methodology of reconnaissance, scanning, exploitation, keeping access, and covering tracks. An example scenario is provided where an attacker uses a 0-day exploit to infiltrate a target organization and steal intellectual property. The incident response team is then activated to contain the incident, eradicate the threat, and implement lessons learned.
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
The document discusses a workshop on incident response and handling and digital forensics presented by ACAD-CSIRT. It provides an overview of the incident response process, including preparation, identification, containment, eradication, recovery, and lessons learned. It also discusses the attacker's process and common techniques. The workshop covers the incident response lifecycle in detail and strategies for containment, including quarantining systems, documentation, backups, and digital forensics best practices.
2019 03-25 acad-csirt career in security to polinela lampung 25 maret2019 finalIGN MANTRA
KULIAH UMUM INDONESIA SOCIETY 5.0,
Pentingnya Peningkatan Kesadaran Keamanan Data dan Informasi Menyongsong Society 5.0
POLINELA, Politeknik Negeri Lampung, 25 Maret 2019
IGN Mantra, ACADEMIC CERT, PERBANAS INSTITUTE
Cyber Security, Career, Computer Security, CIA Confidentiality, Integrity and Availability
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
ISO 27001:2013 Awareness, Seminar & Workshop Indonesia Honeynet Project IHP, Badan Siber dan Sandi Negara BSSN, Universitas Syiah Kuala Unsyiah, 23-24 Oktober 2018
ISO 27001 Awareness IGN Mantra 2nd Day, 2nd Session.IGN MANTRA
ISO 27001:2013 Awareness, Seminar & Workshop Indonesia Honeynet Project IHP, Badan Siber dan Sandi Negara BSSN, Universitas Syiah Kuala Unsyiah, 23-24 Oktober 2018
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
This document provides an introduction to information security and ISO 27001. It discusses key concepts like what information security is, the importance of protecting information assets, common information security threats, and ISO 27001 which defines an Information Security Management System. The document is intended to raise awareness of information security and an individual's security responsibilities within an organization.
SEMINAR Computer & Cyber Security Career in the World, IT UPIGN MANTRA
Seminar tentang Computer dan Cyber Security Career di dunia, yang dilaksanakan di Teknik Informatika, Universitas Pancasila, 13 April 2018, Ruang Seminar Multimedia, oleh IGN Mantra dan IMATIKA
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITY
1. DIREKTORAT
KEAMANAN
INFORMASI
BIMTEK
“KEAMANAN
INFORMASI
DAN
PENANGANAN
JARINGAN
INFORMASI”
HARI
2
:
WARDRIVING
and
WIRELESS
SECURITY
THE
PADE
-‐
NAD,
14
NOVEMBER
2013
2. WARDRIVING
and
WIRELESS
SECURITY
Indonesia
Academic
CSIRT
Computer
Security
Incident
Response
Team
IGN
Mantra,
Email:
mantra@acad-‐csirt.or.id,
URL:
acad-‐csirt.or.id
3. ObjecIves
• Explain
wireless
technology
• Describe
wireless
networking
standards
• Describe
the
process
of
authenIcaIon
• Describe
wardriving
• Describe
wireless
hacking
and
tools
used
by
hackers
and
security
professionals
3
4. Understanding
Wireless
Technology
• For
a
wireless
network
to
funcIon,
you
must
have
the
right
hardware
and
soRware
• Wireless
technology
is
part
of
our
lives
– Baby
monitors
– Cell
and
cordless
phones
– Pagers
– GPS
– Remote
controls
– Garage
door
openers
– Two-‐way
radios
– Wireless
PDAs
4
5. Components
of
a
Wireless
Network
• A
wireless
network
has
only
three
basic
components
– Access
Point
(AP)
– Wireless
network
interface
card
(WNIC)
– Ethernet
cable
5
6. Access
Points
• An
access
point
(AP)
is
a
transceiver
that
connects
to
an
Ethernet
cable
– It
bridges
the
wireless
network
with
the
wired
network
• Not
all
wireless
networks
connect
to
a
wired
network
– Most
companies
have
Wireless
LANs
(WLANs)
that
connect
to
their
wired
network
topology
6
7. Access
Points
• The
AP
is
where
channels
are
configured
• An
AP
enables
users
to
connect
to
a
LAN
using
wireless
technology
– An
AP
is
available
only
within
a
defined
area
7
8. Service
Set
IdenIfiers
(SSIDs)
• Name
used
to
idenIfy
the
wireless
local
area
network
(WLAN)
• The
SSID
is
configured
on
the
AP
– Unique
1-‐
to
32-‐character
alphanumeric
name
– Name
is
case
sensiIve
• Wireless
computers
need
to
configure
the
SSID
before
connecIng
to
a
wireless
network
8
9. Service
Set
IdenIfiers
(SSIDs)
• SSID
is
transmied
with
each
packet
– IdenIfies
which
network
the
packet
belongs
• The
AP
usually
broadcasts
the
SSID
9
10. Service
Set
IdenIfiers
(SSIDs)
• Many
vendors
have
SSIDs
set
to
a
default
value
that
companies
never
change
• An
AP
can
be
configured
to
not
broadcast
its
SSID
unIl
aRer
authenIcaIon
– Wireless
hackers
can
aempt
to
guess
the
SSID
• Verify
that
your
clients
or
customers
are
not
using
a
default
SSID
10
12. Configuring
an
Access
Point
• Configuring
an
AP
varies
depending
on
the
hardware
– Most
devices
allow
access
through
any
Web
browser
– Enter
IP
address
on
your
Web
browser
and
provide
your
user
logon
name
and
password
12
13. Wireless
Router
• A
wireless
router
includes
an
access
point,
a
router,
and
a
switch
13
15. Configuring
an
Access
Point
• Wireless
ConfiguraIon
OpIons
– SSID
– Wired
Equivalent
Privacy
(WEP)
encrypIon
– WPA
(WiFi
Protected
Access
)
is
beer
15
16. Configuring
an
Access
Point
(conInued)
• Steps
for
configuring
a
D-‐Link
wireless
router
(conInued)
– Turn
off
SSID
broadcast
– You
should
also
change
your
SSID
16
18. Wireless
NICs
• For
wireless
technology
to
work,
each
node
or
computer
must
have
a
wireless
NIC
• NIC’s
main
funcIon
– ConverIng
the
radio
waves
it
receives
into
digital
signals
the
computer
understands
18
19. Wireless
NICs
• There
are
many
wireless
NICs
on
the
market
– Choose
yours
depending
on
how
you
plan
to
use
it
– Some
tools
require
certain
specific
brands
of
NICs
19
20. Understanding
Wireless
Network
Standards
• A
standard
is
a
set
of
rules
formulated
by
an
organizaIon
• InsItute
of
Electrical
and
Electronics
Engineers
(IEEE)
– Defines
several
standards
for
wireless
networks
20
21. IEEE
Standards
• Standards
pass
through
these
groups:
– Working
group
(WG)
– Sponsor
ExecuIve
Commiee
(SEC)
– Standards
Review
Commiee
(RevCom)
– IEEE
Standards
Board
• IEEE
Project
802
– LAN
and
WAN
standards
21
22. The
802.11
Standard
• The
first
wireless
technology
standard
• Defined
wireless
connecIvity
at
1
Mbps
and
2
Mbps
within
a
LAN
• Applied
to
layers
1
and
2
of
the
OSI
model
• Wireless
networks
cannot
detect
collisions
– Carrier
sense
mulIple
access/collision
avoidance
(CSMA/CA)
is
used
instead
of
CSMA/CD
22
23. Addressing
• Wireless
LANs
do
not
have
an
address
associated
with
a
physical
locaIon
– An
addressable
unit
is
called
a
staIon
(STA)
23
24. The
Basic
Architecture
of
802.11
• 802.11
uses
a
basic
service
set
(BSS)
as
its
building
block
– Computers
within
a
BSS
can
communicate
with
each
other
24
25. The
Basic
Architecture
of
802.11
• To
connect
two
BSSs,
802.11
requires
a
distribuIon
system
(DS)
25
26. Frequency
Range
• In
the
United
States,
Wi-‐Fi
uses
frequencies
near
2.4
GHz
• (Except
802.11a
at
5
GHz)
– There
are
11
channels,
but
they
overlap,
so
only
three
are
commonly
used
• See
link
Ch
11c
(cisco.com)
26
27. Infrared
(IR)
• Infrared
light
can’t
be
seen
by
the
human
eye
• IR
technology
is
restricted
to
a
single
room
or
line
of
sight
• IR
light
cannot
penetrate
walls,
ceilings,
or
floors
– Image:
IR
transmier
for
wireless
headphones
27
28. IEEE
AddiIonal
802.11
Projects
• 802.11a
– Created
in
1999
– OperaIng
frequency
5
GHz
– Throughput
54
Mbps
28
29. IEEE
AddiIonal
802.11
Projects
(conInued)
• 802.11b
– Operates
in
the
2.4
GHz
range
– Throughput
11
Mbps
– Also
referred
as
Wi-‐Fi
(wireless
fidelity)
– Allows
for
11
channels
to
prevent
overlapping
signals
• EffecIvely
only
three
channels
(1,
6,
and
11)
can
be
used
in
combinaIon
without
overlapping
– Introduced
Wired
Equivalent
Privacy
(WEP)
29
30. IEEE
AddiIonal
802.11
Projects
(conInued)
• 802.11e
– It
has
improvements
to
address
the
problem
of
interference
• When
interference
is
detected,
signals
can
jump
to
another
frequency
more
quickly
• 802.11g
– Operates
in
the
2.4
GHz
range
– Throughput
increased
from
11
Mbps
to
54
Mbps
30
31. IEEE
AddiIonal
802.11
Projects
(conInued)
• 802.11i
– Introduced
Wi-‐Fi
Protected
Access
(WPA)
– Corrected
many
of
the
security
vulnerabiliIes
of
802.11b
• 802.11n
(draR)
– Finalized
in
Dec
2009
– Speeds
up
to
300
Mbps
– Aerohive
AP
runs
at
264
Mbps
now
31
32. IEEE
AddiIonal
802.11
Projects
(conInued)
• 802.15
– Addresses
networking
devices
within
one
person’s
workspace
• Called
wireless
personal
area
network
(WPAN)
– Bluetooth
is
one
of
six
802.15
standards
• Image
from
ubergizmo.com
32
33. IEEE
AddiIonal
802.11
Projects
(conInued)
• Bluetooth
– Defines
a
method
for
interconnecIng
portable
devices
without
wires
– Maximum
distance
allowed
is
10
meters
– It
uses
the
2.45
GHz
frequency
band
– Throughput
of
up
to
2.1
Mbps
for
Bluetooth
2.0
• Note:
the
speed
value
of
12
Mbps
in
your
book
and
the
lecture
notes
is
wrong.
33
34. IEEE
AddiIonal
802.11
Projects
(conInued)
• 802.16
(also
called
WIMAX)
– Addresses
the
issue
of
wireless
metropolitan
area
networks
(MANs)
– Defines
the
WirelessMAN
Air
Interface
– Range
of
up
to
30
miles
– Throughput
of
up
to
120
Mbps
• 802.20
– Addresses
wireless
MANs
for
mobile
users
who
are
sijng
in
trains,
subways,
or
cars
traveling
at
speeds
up
to
150
miles
per
hour
34
35. IEEE
AddiIonal
802.11
Projects
(conInued)
• Bluetooth
– Defines
a
method
for
interconnecIng
portable
devices
without
wires
– Maximum
distance
allowed
is
10
meters
– It
uses
the
2.45
GHz
frequency
band
– Throughput
of
up
to
12
Mbps
• HiperLAN2
– European
WLAN
standard
– It
is
not
compaIble
with
802.11
standards
35
37. Understanding
AuthenIcaIon
• Wireless
technology
brings
new
security
risks
to
a
network
• Authen'ca'on
– Establishing
that
a
user
is
authenIc—authorized
to
use
the
network
– If
authenIcaIon
fails,
anyone
in
radio
range
can
use
your
network
37
38. The
802.1X
Standard
• Defines
the
process
of
authenIcaIng
and
authorizing
users
on
a
WLAN
• Basic
concepts
– Point-‐to-‐Point
Protocol
(PPP)
– Extensible
AuthenIcaIon
Protocol
(EAP)
– Wired
Equivalent
Privacy
(WEP)
– Wi-‐Fi
Protected
Access
(WPA)
38
39. Point-‐to-‐Point
Protocol
(PPP)
• Many
ISPs
use
PPP
to
connect
dial-‐up
or
DSL
users
• PPP
handles
authenIcaIon
with
a
user
name
and
password,
sent
with
PAP
or
CHAP
– PAP
(Password
AuthenIcaIon
Protocol)
sends
passwords
unencrypted
• Vulnerable
to
trivial
sniffing
aacks
39
40. CHAP
Vulnerability
• CHAP
(Challenge-‐Handshake
AuthenIcaIon
Protocol)
– Server
sends
a
Challenge
with
a
random
value
– Client
sends
a
Response,
hashing
the
random
value
with
the
secret
password
• This
is
sIll
vulnerable
to
a
sort
of
session
hijacking
aack
40
41. Extensible
AuthenIcaIon
Protocol
(EAP)
• EAP
is
an
enhancement
to
PPP
• Allows
a
company
to
select
its
authenIcaIon
method
– CerIficates
– Kerberos
• Kerberos
is
used
on
LANs
for
authenIcaIon
• Uses
Tickets
and
Keys
• Used
by
Windows
2000,
XP,
and
2003
Server
by
default
• Not
common
on
WLANS
(I
think)
41
42. X.509
CerIficate
• Record
that
authenIcates
network
enIIes
• IdenIfies
– The
owner
– The
cerIficate
authority
(CA)
– The
owner’s
public
key
42
44. Public
Key
• Your
browser
uses
the
Public
Key
to
encrypt
data
so
only
Gmail
can
read
it
44
45. LEAP
• Lightweight
Extensible
AuthenIcaIon
Protocol
(LEAP)
– A
Cisco
product
– Vulnerable,
but
Cisco
didn’t
care
– Joshua
Wright
wrote
the
ASLEAP
hacking
tool
to
crack
LEAP,
and
forced
Cisco
to
develop
a
beer
protocol
45
46. More
Secure
EAP
Methods
• Extensible
AuthenIcaIon
Protocol-‐Transport
Layer
Security
(EAP-‐TLS)
– Secure
but
rarely
used,
because
both
client
and
server
need
cerIficates
signed
by
a
CA
• Protected
EAP
(PEAP)
and
MicrosoR
PEAP
– Very
secure,
only
requires
server
to
have
a
cerIficate
signed
by
a
CA
• See
link
Ch
11h
46
47. 802.1X
components
• Supplicant
– The
user
accessing
a
WLAN
• AuthenIcator
– The
AP
• AuthenIcaIon
server
– Checks
an
account
database
to
see
if
user’s
credenIals
are
acceptable
– May
use
RADIUS
(Remote
Access
Dial-‐In
User
Service)
47
49. Wired
Equivalent
Privacy
(WEP)
• Part
of
the
802.11b
standard
• Encrypts
data
on
a
wireless
network
• WEP
has
many
vulnerabiliIes
• To
crack
WEP
49
50. Wi-‐Fi
Protected
Access
(WPA)
• Specified
in
the
802.11i
standard
• Replaces
WEP
• WPA
improves
encrypIon
by
using
Temporal
Key
Integrity
Protocol
(TKIP)
50
52. TKIP
Enhancements
• Per-‐packet
key
mixing
– MAC
addresses
are
used
to
create
a
key
– Each
link
uses
a
different
key
• Rekeying
mechanism
– Provides
fresh
keys
– Prevents
aackers
from
reusing
old
keys
52
53. WPA
Adds
802.1x
• WPA
also
adds
an
authenIcaIon
mechanism
implemenIng
802.1X
and
EAP
– This
was
not
available
in
WEP
53
54. Understanding
Wardriving
• Hackers
use
wardriving
– Finding
insecure
access
points
– Using
a
laptop
or
palmtop
computer
• Wardriving
is
not
illegal
– But
using
the
resources
of
these
networks
is
illegal
• Warflying
– Variant
where
an
airplane
is
used
instead
of
a
car
54
55. How
It
Works
• An
aacker
or
security
tester
simply
drives
around
with
the
following
equipment
– Laptop
computer
– Wireless
NIC
– An
antenna
– SoRware
that
scans
the
area
for
SSIDs
• Not
all
wireless
NICs
are
compaIble
with
scanning
programs
• Antenna
prices
vary
depending
on
the
quality
55
and
the
range
they
can
cover
56. How
It
Works
(conInued)
• Scanning
soRware
can
idenIfy
– The
company’s
SSID
– The
type
of
security
enabled
– The
signal
strength
• IndicaIng
how
close
the
AP
is
to
the
aacker
56
58. NetStumbler
• Shareware
tool
wrien
for
Windows
that
enables
you
to
detect
WLANs
– Supports
802.11a,
802.11b,
and
802.11g
standards
• NetStumbler
was
primarily
designed
to
– Verify
your
WLAN
configuraIon
– Detect
other
wireless
networks
– Detect
unauthorized
APs
58
59. NetStumbler
• NetStumbler
is
capable
of
interface
with
a
GPS
– Enabling
a
security
tester
or
hacker
to
map
out
locaIons
of
all
the
WLANs
the
soRware
detects
59
60. NetStumbler
• NetStumbler
logs
the
following
informaIon
– SSID
– MAC
address
and
Manufacturer
of
the
AP
– Channel
– Signal
Strength
– EncrypIon
• Can
detect
APs
within
a
350-‐foot
radius
– With
a
good
antenna,
they
can
locate
APs
a
couple
of
miles
away
60
63. Kismet
• Another
product
for
conducIng
wardriving
aacks
• Runs
on
Linux,
BSD,
MAC
OS
X,
and
Linux
PDAs
• Kismet
is
adverIsed
also
as
a
sniffer
and
IDS
– Kismet
can
sniff
802.11b,
802.11a,
and
802.11g
traffic
63
64. Kismet
features
– Ethereal-‐
and
Tcpdump-‐compaIble
data
logging
– AirSnort
compaIble
– Network
IP
range
detecIon
64
65. Kismet
features
(conInued)
– Hidden
network
SSID
detecIon
– Graphical
mapping
of
networks
– Client-‐server
architecture
– Manufacturer
and
model
idenIficaIon
of
APs
and
clients
– DetecIon
of
known
default
access
point
configuraIons
– XML
output
– Supports
20
card
types
65
66. Understanding
Wireless
Hacking
• Hacking
a
wireless
network
is
not
much
different
from
hacking
a
wired
LAN
• Techniques
for
hacking
wireless
networks
– Port
scanning
– EnumeraIon
66
67. Tools
of
the
Trade
• Equipment
– Laptop
computer
– A
wireless
NIC
– An
antenna
– Sniffer
soRware
67
68. AirSnort
• Created
by
Jeremy
Bruestle
and
Blake
Hegerle
• It
is
the
tool
most
hackers
wanIng
to
access
WEP-‐enabled
WLANs
use
• AirSnort
limitaIons
– Runs
on
either
Linux
or
Windows
(textbook
is
wrong)
– Requires
specific
drivers
– Not
all
wireless
NICs
funcIon
with
AirSnort
• See
links
Ch
11p,
11q
68
69. WEPCrack
• Another
open-‐source
tool
used
to
crack
WEP
encrypIon
– WEPCrack
was
released
about
a
week
before
AirSnort
• It
also
works
on
*NIX
systems
• WEPCrack
uses
Perl
scripts
to
carry
out
aacks
on
wireless
systems
– AirSnort
is
considered
beer
(link
Ch
11r)
69
70. Countermeasures
for
Wireless
Aacks
• AnI-‐wardriving
soRware
makes
it
more
difficult
for
aackers
to
discover
your
wireless
LAN
– Honeypots
• Servers
with
fake
data
to
snare
intruders
– Fakeap
and
Black
Alchemy
Fake
AP
• SoRware
that
makes
fake
Access
Points
70
71. Countermeasures
for
Wireless
Aacks
• Use
special
paint
to
stop
radio
from
escaping
your
building
• Allow
only
predetermined
MAC
addresses
and
IP
addresses
to
have
access
to
the
wireless
LAN
• Use
an
authenIcaIon
server
instead
of
relying
on
a
wireless
device
to
authenIcate
users
71
72. Countermeasures
for
Wireless
Aacks
• Use
an
EAP
authenIcaIon
protocol
• If
you
use
WEP,
use
104-‐bit
encrypIon
rather
than
40-‐bit
encrypIon
– But
just
use
WPA
instead
• Assign
staIc
IP
addresses
to
wireless
clients
instead
of
using
DHCP
• Don’t
broadcast
the
SSID
72
74. WRAP
UP
• Use
these
Ips
to
prevent
unwanted
users
– Change
default
sejng
on
your
router
• When
you
install
router
modify
id
and
pwd
to
something
else
rather
than
default
– Disable
SSID
broadcast
• Hides
network
from
beginner
intruder.
Ie.
Windows
Wireless
Zero
config
uIlity
• Will
not
keep
you
safe
from
more
advance
hackers
– Turn
off
network
when
not
in
use
• Impossible
to
hack
a
network
that
it
is
not
running
– MAC
address
filtering
• AP
grants
access
to
certain
MAC
addresses
• Not
fully
proof,
but
good
countermeasure
– EncrypIon
• Use
of
WPA
• Use
long
and
random
WPA
keys
74