Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 1 Rick Graziani Cabrillo College Spring 2017

Similar presentations


Presentation on theme: "CS 1 Rick Graziani Cabrillo College Spring 2017"— Presentation transcript:

1 CS 1 Rick Graziani Cabrillo College Spring 2017
Wireless, and Security CS 1 Rick Graziani Cabrillo College Spring 2017

2 1981 primitive Internet report on KRON
Rick Graziani

3 Circuit Switched Circuit Switching: A form of data communication which establishes a single connection or circuit between source and destination to carry the data stream. Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party. Rick Graziani

4 The range of G.fast will be very short — on the order of 250 meters (820 feet).
Basically, G.fast is envisaged as the ideal way of getting fiber-like speeds from the cabinet, manhole, or telephone pole. Rick Graziani

5 Packet Switching Packet Switching: A form of data communications which breaks a data stream into small sections, sends them separately by the best available channels and reassembles the original data stream at its destination. An alternative is to allocate the capacity to the traffic only when it is needed, and share the available capacity between many users. Rick Graziani

6 Wireless Access Point A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usually an Ethernet LAN. Rick Graziani

7 Wireless Access Point In our example the wireless access point (AP) will include a Router. Rick Graziani

8 Configuring the AP and Router
Wireless Settings: SSID (Service Set Identifier) – Name of your network Security: WPA2, WPA, WEP, or none SSID Rick Graziani

9 Configuring the AP and Router
Wireless Settings: Security: WPA2, WPA, WEP, or none WPA2 Rick Graziani

10 SSID The SSID is what will be displayed when people with wireless computers are looking for a wireless LAN. Rick Graziani

11 Linksys WRT54G Router Information IP Address from ISP
Connects to your DSL/Cable Modem NAT (Network Address Translation) Local Network Ethernet Switch Connect “wired” computers DHCP Server (optional) Wireless SSID: MyHomeNetwork DHCP Server: (optional) Channel: 11 Encryption Function: WPA Rick Graziani

12 You choose… There are many resources to discuss the possible health risks or wireless LANs. As a networking and WLAN user and instructor I have my own thoughts which I will share. If you are concerned, then research the information and come to your own conclusions. The following information is from my own research and experience. Rick Graziani

13 Wireless Frequency Wireless APs operate at: 2.4 GHz 5 GHz
2 GHZ! That’s the same as my microwave oven, isn’t that dangerous? Answer: No. Electromagnetic waves happen naturally. Light is an electromagnetic wave It is not the frequency, but the wattage, the power. Any electromagnetic wave can be dangerous with too much power. A 25 watt light bulb is safe, but it wouldn’t be safe at 250,000 watts Wireless access points generate signals at 1/10th of a watt. Like all electromagnetic waves, the signal does not fade in a linear manner, but inversely as the square of the distance. Rick Graziani

14 Rick Graziani graziani@cabrillo.edu

15 Inverse square law 10 20 30 40 50 100 Point A 10 times the distance 1/100 the power of A 3 times the distance 1/9 the power of Point A 2 times the distance ¼ the power of Point A 5 times the distance 1/25 the power of Point A Double the distance of the wireless link, we receive only ¼ of the original power. Triple the distance of the wireless link, we receive only 1/9 the original power. Move 5 times the distance, signal decreases by 1/25. Rick Graziani

16 Putting it in some perspective
Measurements from an antenna transmitting 100mW at 1 inch Remember a milliwatt is 1/1,000th of a Watt Microwave oven typically operates at 1,000 watts in a confined space. 1” mW 1/10th watt 2” mW /40th watt 4” mW /166th watt 8” mW 1/1000th watt 16” mW 4/10,000th watt 32” mW 1/10,000th watt 64” (5.3 ft) mW 2/100,000th watt 128” (10.6 ft) mW 6/1,000,000th watt 256” (21.3 ft) mW 15/10,000,000th watt Light bulbs would also be dangerous the were 10,000 to 1,000,000,000,000 stronger. A 250,000 watt up to a 250,000,000,000,000 watt light bulb would also be dangerous. Rick Graziani

17 Rick Graziani graziani@cabrillo.edu

18 Wireless N and ac Wireless N provides better speeds (bandwidth – 450 Mbps) and better range by utilizing multiple antennas. Backwards compatible with b and g. 802.11ac uses 5Ghz band –1300 Mbps and more Rick Graziani

19 Wireless Security – Everyone can hear
Others can “hear” or capture your information. Wireless signals are propagated, sent, similar to our voice sound waves. Rick Graziani

20 Cell Phones do not cause explosions
Rick Graziani

21 Wireless Security – Everyone can hear
If we don’t want them to understand what they hear, we can encrypt or code the information. As long a our wireless computer and access point are using the same encryption algorithm, such as WPA2. Make your Pre-Shared Key over 25 characters long and make it random Rick Graziani

22 From the Greek kryptós, "hidden," and lógos, "word“
Cryptology From the Greek kryptós, "hidden," and lógos, "word“ Is the science of secure (or, generally speaking), secret communication Cryptography The branch of applied mathematics that concerns itself with transforming messages into seemingly unintelligible forms and back again so it cannot be viewed by unauthorized users Rick Graziani

23 Cryptography is the process of converting plaintext into ciphertext (unreadable text) by using an encoding function, such as an encryption algorithm or a secret list of substitution characters Rick Graziani

24 Examples of Applied Cryptography
Phone cards, cell phones, remote controls Cash machines, money transfer between banks Electronic cash, online banking, secure Satellite TV, pay-per-view TV Digital Rights Management (DRM) Etc., etc… Rick Graziani

25 Benefits of Cryptography
Protections provided: Confidentiality Authentication Integrity Rick Graziani

26 Characteristics of a Secure VPNs
Authentication Verify the sender Trust the sender is whom they claim to be Ensures that a message: comes from an authentic source and goes to an authentic destination Rick Graziani

27 Characteristics of a Secure VPNs
Data confidentiality Allows only authorized users to access the Information Protecting data from eavesdroppers Aims at protecting the message contents from being intercepted by unauthenticated or unauthorized sources. Rick Graziani

28 Characteristics of a Secure VPNs
Data integrity Trust the information has not been altered Across the Internet, there is always the possibility that the data has been modified. Data integrity guarantees that between the source and destination: No tampering or alternation to data digital signatures Rick Graziani

29 Decryption: reverse process of encryption
Encryption: changing the original text to a secret message using cryptography Decryption: reverse process of encryption Rick Graziani

30 Algorithm: mathematical procedure that works with a key to generate ciphertext from plaintext input
AKA cipher Rick Graziani

31 Key: is a mathematical value (e. g
Key: is a mathematical value (e.g., word, number, phrase) that determines how a plaintext message is encrypted to produce ciphertext Its possession is required to decrypt the ciphertext and recover the original message Rick Graziani

32 Generally, the larger the key length, the more secure the ciphertext
Key Length: keys have a corresponding key length (or key size): which is the number of bits, or sometimes bytes, in the key Key lengths tend to be huge numbers a 2-bit key has 4 values in its key space (00, 01, 10, 11) Generally, the larger the key length, the more secure the ciphertext Rick Graziani

33 Wireless Security Your web browsing or access should already be secured. HTTPS - Look for the lock Rick Graziani

34 Pop-ups (Wikipedia.org)
Ultimate irony! Banner Ads first used by Yahoo. Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer allowed the user to block pop-ups almost completely. Rick Graziani

35 Rick Graziani graziani@cabrillo.edu

36 Pop-up, looks real… Rick Graziani

37 C/NET – Pop-ups mean more $$$
Publishers willingly allow pop-ups or pop-unders because they command higher prices, and they're in high demand by advertisers. Rick Graziani

38 But are the clicks real or bots?
Rick Graziani

39 Spyware (Wikipedia.org)
Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent. May perform many different functions, including: Delivery of unrequested advertising (pop-up ads in particular), Harvesting private information Re-routing page requests to illegally claim commercial site referral fees Spyware or Malware Can include: keystroke loggers denial-of-service (DoS) attack agents Rick Graziani

40 Cookies A cookie is information sent by a server to a browser and then sent back to the server each time it accesses that server. Amongst other uses, cookies enable websites to be customized for individual users once browsing patterns have been established. Cookies only store information that you provide. Rick Graziani

41 First time you login HTTP Requests: GET (first time)
HTTP: Response Set-cookie: ID HTTP Server HTTP Requests (GET) now include ID HTTP Client Web server can now track clients activities on the web site. Rick Graziani

42 Each time you login… HTTP: Cookie 5551212 included HTTP Server
HTTP data customized for Rick Graziani HTTP Client Rick Graziani

43 Cookies - Purpose Typically this is used to authenticate or identify a registered user of a web site as part of their first login process or initial site registration without requiring them to sign in again every time they access that site. Other uses are maintaining a "shopping basket" of goods selected for purchase during a session at a site, site personalization (presenting different pages to different users), and tracking a particular user's access to a site. Rick Graziani

44 Cookies - Permissions A browser may or may not allow the use of cookies. The user can usually choose a setting. Microsoft Internet Explorer Tools > Internet Options > Privacy Tab Use slider to set options, or use advanced options Rick Graziani

45 Rick Graziani

46 Phishing… Rick Graziani

47 Rick Graziani graziani@cabrillo.edu

48 Rick Graziani graziani@cabrillo.edu

49 Rick Graziani graziani@cabrillo.edu

50 Rick Graziani graziani@cabrillo.edu

51 Rick Graziani graziani@cabrillo.edu

52 Rick Graziani graziani@cabrillo.edu

53 Rick Graziani graziani@cabrillo.edu

54 Rick Graziani graziani@cabrillo.edu

55 Rick Graziani graziani@cabrillo.edu

56 Rick Graziani graziani@cabrillo.edu

57 The Nigerian Email Spam Scam
ABC Report on Nigerian Scammers Rick Graziani

58 Passwords Combine letters, numbers, and symbols.
Use words and phrases that are easy for you to remember, but difficult for others to guess. Avoid sequences or repeated characters. " ”, "abcdefg" Avoid using only look-alike substitutions of numbers or symbols. 'i' with a '1' 'a' with ‘o’ with a 0’ "M1cr0$0ft" or (these are not good though) At least 8 characters; more than14 characters is even better But these substitutions can be effective when combined with other measures: Rick Graziani

59 Hoaxes, Scams, and Fraud This hoax generated thousands of s with the first day alone. Rick Graziani

60 Google name or go to Snopes.com
Rick Graziani

61 Swiffer Wetjet Rick Graziani

62 Typical Scam Subject:    Account Confirmation {Account Expires in 4 days} Date:       Mon, 15 Sep :14: From:       Leboyd, Nichole Dear Staff/Student This message is from the IT Service messaging center to all subscribers/webmail users. We are currently upgrading the webmail data base and centers due to an unusual activities identified in our system. We are deleting all unused Webmail Accounts. You are required to verify and update your Webmail by confirming your Webmail identity. This will prevent your Webmail account from been closed during this exercise. In order to confirm your Webmail identity, you are to provide the following data; Confirm Your WebMail Identity Below; First Name: Last Name: Username/ID: Password: Date of Birth: Warning: Any subscriber/webmail user that refuses to verify and subsequently update his/her Webmail within 4 days of receiving this warning will lose his/her Webmail Account permanently. We thank you for your prompt attention to this matter. Please understand that this is a security measure intended to help protect your Webmail Account. We apologise for any inconvenience. Regards, Leboyd Nichole Webmail Administrator. Rick Graziani

63 Wells Fargo (Scam) Rick Graziani

64 Fake Site Rick Graziani

65 Fake and Real Sites Rick Graziani

66 Wells Fargo – Reporting Fraud Emails
Rick Graziani

67 PayPal Rick Graziani

68 USAA Rick Graziani

69 Changing Who From Rick Graziani

70 Create Fake Rick Graziani

71 Creating Fake Link Rick Graziani

72 Receiver Rick Graziani

73 Looking at Options doesn’t help
Rick Graziani

74 Click on Link… Rick Graziani

75 Sites to check for hoaxes
Rick Graziani

76 Rick Graziani graziani@cabrillo.edu

77 Rick Graziani graziani@cabrillo.edu

78 Rick Graziani graziani@cabrillo.edu

79 Rick Graziani graziani@cabrillo.edu

80 Rick Graziani graziani@cabrillo.edu

81 Rick Graziani graziani@cabrillo.edu

82 Rick Graziani graziani@cabrillo.edu

83 Wireless, and Security CS 1 Rick Graziani


Download ppt "CS 1 Rick Graziani Cabrillo College Spring 2017"

Similar presentations


Ads by Google