Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka Wireless Technologies Department Head Communications and Imaging Division Applied Research.

Slides:



Advertisements
Similar presentations
ATK Space 9617 Distribution Avenue San Diego, California Tel: (858) Fax: (858) Website:
Advertisements

User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
1 ZIXCORP The BYOD Tug-of-War: Security versus Privacy Neil Farquharson January, 2015.
1 Sending a Message Then and Now Trinidad September 2008 Nico Beute.
Cyber Security and the Global Business Environment Jeremy Schaar:)
InformationWeek 2014 Mobile Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Flash Wireless Customer Training
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
+ Electric Messages: Then and Now. + What will we do today? Send a message - using yesterday’s technology Send a message - using today’s technology 2.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Grad Orientation Computer Resources. Activate your PSU ID  ALL OF OUR SERVICES DEPEND ON THIS STEP!!!  Once you get your PSU ID you will need to visit.
Ji Yeon Chu, Lindsey Fong, Jonathan Bender, Yi Low, and Umang Patel.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Electric Messages: Then and Now 1. What will we do today? Send a message - using yesterday’s technology Send a message - using today’s technology.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
Google Wallet By: Amanda Tazbaz ITMG 10. How it works ● Download application on Android smartphone ● Set up payment information ● Shop in store ● Click.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Instructions Replace the questions with full sentences that answer them. Once you have finished your research you will be writing a dramatic and descriptive.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Mobile Apps for Small Businesses Your customers are mobile. Is your business? EDA Tech Comm
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
The rising standards of EU Mobile Payments October 2015 Jeremy King, International Director.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Limitless communication on long-haul flights Lufthansa FlyNet ®
Mobile Device Security Management Leyna Belinsky.
Total Enterprise Mobility Comprehensive Management and Security
Various Features and Services Provided By the SpotCam.
Combating Identity Fraud In A Virtual World
Mobile Devices in the Corporate World
Mobile Operating Systems
Welcome to KTH and KTH IT-Support
Introduction to Wireless Technology
Wifi Map Pro APK By: atozapps.org.
Matt G change over point ?
Unit 7 – Organisational Systems Security
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Industry Best Practices – Security For Smartphones / Mobile Devices
Security in mobile technologies
Personal Mobile Device Acceptable Use Policy Training Slideshow
PREPARING YOUR TECHNOLOGY
Presentation transcript:

Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka Wireless Technologies Department Head Communications and Imaging Division Applied Research Laboratory (814)

The Wireless Technologies Department is part of the Communications and Imaging Division within the Communications, Information and Navigation Office at ARL. In the Department... We perform basic and applied research, exploratory development, and advanced development in support of program sponsors We champion the transfer of advanced technologies to naval acquisition programs and fleet operations as well as to other government agencies and the private sector Mission

One hundred years ago.… April 14/15, 1912 Titanic hits iceberg and sinks in North Atlantic. ~ 1500 lives lost Let’s look at the role that wireless played in this disaster

Titanic Wireless Technology Consisted of “Marconi” set Comms simply by Morse Code (…---…) Enabled comms to other ships in vicinity and shore- based stations After Titanic hit iceberg, SOS sent almost continuously until ship ultimately sunk SS Californian nearby (~10 miles)

Why didn’t Californian aid Titanic? Titanic sent SOS for ~ 3 hours Californian certainly capable of receiving SOS Californian had Marconi set powered off for night! It was not the technology that failed; it was failure in the way that the technology was used Laws were then implemented requiring 24 hour monitoring of Marconi systems This was an attempt to correct the way that the technology was used What does this have to do with Network Security?

Titanic Wireless Security Issues Was there concern over lost/stolen Marconi devices? How about malware and viruses getting inadvertently loaded onto a Marconi system? Were open Wi-Fi networks and Public Hotspots an issue? What about the problems associated with a personal Marconi being put on a company network?

Titanic Wireless Security Issues Was there concern over lost/stolen Marconi devices? How about malware and viruses getting inadvertently loaded onto a Marconi system? Were open Wi-Fi networks and Public Hotspots an issue? What about the problems associated with a personal Marconi being put on a company network? The answer to all of these questions is obviously NO. But they are all concerns 100 years later with current wireless devices!

BYOD Bring Your Own Device We are in an era where a personal device can be used to access corporate data , appropriately mapped storage, Intranet Basically to do work outside of work

What’s the Big Deal? According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers…… BUT!!!!

What’s the Big Deal? According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers…… Studies also show that consumers are lax about mobile security…… BUT!!!!

What’s the Biggest Risk? Is it malware or viruses? If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.

What’s the Biggest Risk? Is it malware or viruses? If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. NO!

What’s the Biggest Risk? Is it malware or viruses? If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. Is it using your device on an open Wi-Fi or public hotspot? In 2011 the UK based newspaper The Guardian set up a mock Wi- Fi hotspot in an airport and was easily able to obtain user information ranging from passwords to credit card information. NO!

What’s the Biggest Risk? Is it malware or viruses? If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. Is it using your device on an open WI-FI or public hotspot? In 2011 the UK based newspaper The Guardian set up a mock Wi- Fi hotspot in an airport and was easily able to obtain user information ranging from passwords to credit card information. NO!

The Biggest Risk It is a lost or stolen device “Security experts agree most of the threats to mobile devices come in the form of people losing their devices or having them stolen” - eWeek.com, “Dealing with Enterprise Mobile Security” Oct 6, 2010

In Closing….. Protect your device Don’t be the “iceberg that sinks your company’s data!”

The Applied Research Laboratory The Pennsylvania State University ARL Penn State P.O. Box 30 State College, Pennsylvania Questions?