Download presentation
Presentation is loading. Please wait.
1
CS 1 Rick Graziani Cabrillo College Spring 2017
Wireless, and Security CS 1 Rick Graziani Cabrillo College Spring 2017
2
1981 primitive Internet report on KRON
Rick Graziani
3
Circuit Switched Circuit Switching: A form of data communication which establishes a single connection or circuit between source and destination to carry the data stream. Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party. Rick Graziani
4
The range of G.fast will be very short — on the order of 250 meters (820 feet).
Basically, G.fast is envisaged as the ideal way of getting fiber-like speeds from the cabinet, manhole, or telephone pole. Rick Graziani
5
Packet Switching Packet Switching: A form of data communications which breaks a data stream into small sections, sends them separately by the best available channels and reassembles the original data stream at its destination. An alternative is to allocate the capacity to the traffic only when it is needed, and share the available capacity between many users. Rick Graziani
6
Wireless Access Point A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usually an Ethernet LAN. Rick Graziani
7
Wireless Access Point In our example the wireless access point (AP) will include a Router. Rick Graziani
8
Configuring the AP and Router
Wireless Settings: SSID (Service Set Identifier) – Name of your network Security: WPA2, WPA, WEP, or none SSID Rick Graziani
9
Configuring the AP and Router
Wireless Settings: Security: WPA2, WPA, WEP, or none WPA2 Rick Graziani
10
SSID The SSID is what will be displayed when people with wireless computers are looking for a wireless LAN. Rick Graziani
11
Linksys WRT54G Router Information IP Address from ISP
Connects to your DSL/Cable Modem NAT (Network Address Translation) Local Network Ethernet Switch Connect “wired” computers DHCP Server (optional) Wireless SSID: MyHomeNetwork DHCP Server: (optional) Channel: 11 Encryption Function: WPA Rick Graziani
12
You choose… There are many resources to discuss the possible health risks or wireless LANs. As a networking and WLAN user and instructor I have my own thoughts which I will share. If you are concerned, then research the information and come to your own conclusions. The following information is from my own research and experience. Rick Graziani
13
Wireless Frequency Wireless APs operate at: 2.4 GHz 5 GHz
2 GHZ! That’s the same as my microwave oven, isn’t that dangerous? Answer: No. Electromagnetic waves happen naturally. Light is an electromagnetic wave It is not the frequency, but the wattage, the power. Any electromagnetic wave can be dangerous with too much power. A 25 watt light bulb is safe, but it wouldn’t be safe at 250,000 watts Wireless access points generate signals at 1/10th of a watt. Like all electromagnetic waves, the signal does not fade in a linear manner, but inversely as the square of the distance. Rick Graziani
14
Rick Graziani graziani@cabrillo.edu
15
Inverse square law 10 20 30 40 50 100 Point A 10 times the distance 1/100 the power of A 3 times the distance 1/9 the power of Point A 2 times the distance ¼ the power of Point A 5 times the distance 1/25 the power of Point A Double the distance of the wireless link, we receive only ¼ of the original power. Triple the distance of the wireless link, we receive only 1/9 the original power. Move 5 times the distance, signal decreases by 1/25. Rick Graziani
16
Putting it in some perspective
Measurements from an antenna transmitting 100mW at 1 inch Remember a milliwatt is 1/1,000th of a Watt Microwave oven typically operates at 1,000 watts in a confined space. 1” mW 1/10th watt 2” mW /40th watt 4” mW /166th watt 8” mW 1/1000th watt 16” mW 4/10,000th watt 32” mW 1/10,000th watt 64” (5.3 ft) mW 2/100,000th watt 128” (10.6 ft) mW 6/1,000,000th watt 256” (21.3 ft) mW 15/10,000,000th watt Light bulbs would also be dangerous the were 10,000 to 1,000,000,000,000 stronger. A 250,000 watt up to a 250,000,000,000,000 watt light bulb would also be dangerous. Rick Graziani
17
Rick Graziani graziani@cabrillo.edu
18
Wireless N and ac Wireless N provides better speeds (bandwidth – 450 Mbps) and better range by utilizing multiple antennas. Backwards compatible with b and g. 802.11ac uses 5Ghz band –1300 Mbps and more Rick Graziani
19
Wireless Security – Everyone can hear
Others can “hear” or capture your information. Wireless signals are propagated, sent, similar to our voice sound waves. Rick Graziani
20
Cell Phones do not cause explosions
Rick Graziani
21
Wireless Security – Everyone can hear
If we don’t want them to understand what they hear, we can encrypt or code the information. As long a our wireless computer and access point are using the same encryption algorithm, such as WPA2. Make your Pre-Shared Key over 25 characters long and make it random Rick Graziani
22
From the Greek kryptós, "hidden," and lógos, "word“
Cryptology From the Greek kryptós, "hidden," and lógos, "word“ Is the science of secure (or, generally speaking), secret communication Cryptography The branch of applied mathematics that concerns itself with transforming messages into seemingly unintelligible forms and back again so it cannot be viewed by unauthorized users Rick Graziani
23
Cryptography is the process of converting plaintext into ciphertext (unreadable text) by using an encoding function, such as an encryption algorithm or a secret list of substitution characters Rick Graziani
24
Examples of Applied Cryptography
Phone cards, cell phones, remote controls Cash machines, money transfer between banks Electronic cash, online banking, secure Satellite TV, pay-per-view TV Digital Rights Management (DRM) Etc., etc… Rick Graziani
25
Benefits of Cryptography
Protections provided: Confidentiality Authentication Integrity Rick Graziani
26
Characteristics of a Secure VPNs
Authentication Verify the sender Trust the sender is whom they claim to be Ensures that a message: comes from an authentic source and goes to an authentic destination Rick Graziani
27
Characteristics of a Secure VPNs
Data confidentiality Allows only authorized users to access the Information Protecting data from eavesdroppers Aims at protecting the message contents from being intercepted by unauthenticated or unauthorized sources. Rick Graziani
28
Characteristics of a Secure VPNs
Data integrity Trust the information has not been altered Across the Internet, there is always the possibility that the data has been modified. Data integrity guarantees that between the source and destination: No tampering or alternation to data digital signatures Rick Graziani
29
Decryption: reverse process of encryption
Encryption: changing the original text to a secret message using cryptography Decryption: reverse process of encryption Rick Graziani
30
Algorithm: mathematical procedure that works with a key to generate ciphertext from plaintext input
AKA cipher Rick Graziani
31
Key: is a mathematical value (e. g
Key: is a mathematical value (e.g., word, number, phrase) that determines how a plaintext message is encrypted to produce ciphertext Its possession is required to decrypt the ciphertext and recover the original message Rick Graziani
32
Generally, the larger the key length, the more secure the ciphertext
Key Length: keys have a corresponding key length (or key size): which is the number of bits, or sometimes bytes, in the key Key lengths tend to be huge numbers a 2-bit key has 4 values in its key space (00, 01, 10, 11) Generally, the larger the key length, the more secure the ciphertext Rick Graziani
33
Wireless Security Your web browsing or access should already be secured. HTTPS - Look for the lock Rick Graziani
34
Pop-ups (Wikipedia.org)
Ultimate irony! Banner Ads first used by Yahoo. Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer allowed the user to block pop-ups almost completely. Rick Graziani
35
Rick Graziani graziani@cabrillo.edu
36
Pop-up, looks real… Rick Graziani
37
C/NET – Pop-ups mean more $$$
Publishers willingly allow pop-ups or pop-unders because they command higher prices, and they're in high demand by advertisers. Rick Graziani
38
But are the clicks real or bots?
Rick Graziani
39
Spyware (Wikipedia.org)
Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent. May perform many different functions, including: Delivery of unrequested advertising (pop-up ads in particular), Harvesting private information Re-routing page requests to illegally claim commercial site referral fees Spyware or Malware Can include: keystroke loggers denial-of-service (DoS) attack agents Rick Graziani
40
Cookies A cookie is information sent by a server to a browser and then sent back to the server each time it accesses that server. Amongst other uses, cookies enable websites to be customized for individual users once browsing patterns have been established. Cookies only store information that you provide. Rick Graziani
41
First time you login HTTP Requests: GET (first time)
HTTP: Response Set-cookie: ID HTTP Server HTTP Requests (GET) now include ID HTTP Client Web server can now track clients activities on the web site. Rick Graziani
42
Each time you login… HTTP: Cookie 5551212 included HTTP Server
HTTP data customized for Rick Graziani HTTP Client Rick Graziani
43
Cookies - Purpose Typically this is used to authenticate or identify a registered user of a web site as part of their first login process or initial site registration without requiring them to sign in again every time they access that site. Other uses are maintaining a "shopping basket" of goods selected for purchase during a session at a site, site personalization (presenting different pages to different users), and tracking a particular user's access to a site. Rick Graziani
44
Cookies - Permissions A browser may or may not allow the use of cookies. The user can usually choose a setting. Microsoft Internet Explorer Tools > Internet Options > Privacy Tab Use slider to set options, or use advanced options Rick Graziani
45
Rick Graziani
46
Phishing… Rick Graziani
47
Rick Graziani graziani@cabrillo.edu
48
Rick Graziani graziani@cabrillo.edu
49
Rick Graziani graziani@cabrillo.edu
50
Rick Graziani graziani@cabrillo.edu
51
Rick Graziani graziani@cabrillo.edu
52
Rick Graziani graziani@cabrillo.edu
53
Rick Graziani graziani@cabrillo.edu
54
Rick Graziani graziani@cabrillo.edu
55
Rick Graziani graziani@cabrillo.edu
56
Rick Graziani graziani@cabrillo.edu
57
The Nigerian Email Spam Scam
ABC Report on Nigerian Scammers Rick Graziani
58
Passwords Combine letters, numbers, and symbols.
Use words and phrases that are easy for you to remember, but difficult for others to guess. Avoid sequences or repeated characters. " ”, "abcdefg" Avoid using only look-alike substitutions of numbers or symbols. 'i' with a '1' 'a' with ‘o’ with a 0’ "M1cr0$0ft" or (these are not good though) At least 8 characters; more than14 characters is even better But these substitutions can be effective when combined with other measures: Rick Graziani
59
Hoaxes, Scams, and Fraud This hoax generated thousands of s with the first day alone. Rick Graziani
60
Google name or go to Snopes.com
Rick Graziani
61
Swiffer Wetjet Rick Graziani
62
Typical Scam Subject: Account Confirmation {Account Expires in 4 days} Date: Mon, 15 Sep :14: From: Leboyd, Nichole Dear Staff/Student This message is from the IT Service messaging center to all subscribers/webmail users. We are currently upgrading the webmail data base and centers due to an unusual activities identified in our system. We are deleting all unused Webmail Accounts. You are required to verify and update your Webmail by confirming your Webmail identity. This will prevent your Webmail account from been closed during this exercise. In order to confirm your Webmail identity, you are to provide the following data; Confirm Your WebMail Identity Below; First Name: Last Name: Username/ID: Password: Date of Birth: Warning: Any subscriber/webmail user that refuses to verify and subsequently update his/her Webmail within 4 days of receiving this warning will lose his/her Webmail Account permanently. We thank you for your prompt attention to this matter. Please understand that this is a security measure intended to help protect your Webmail Account. We apologise for any inconvenience. Regards, Leboyd Nichole Webmail Administrator. Rick Graziani
63
Wells Fargo (Scam) Rick Graziani
64
Fake Site Rick Graziani
65
Fake and Real Sites Rick Graziani
66
Wells Fargo – Reporting Fraud Emails
Rick Graziani
67
PayPal Rick Graziani
68
USAA Rick Graziani
69
Changing Who From Rick Graziani
70
Create Fake Rick Graziani
71
Creating Fake Link Rick Graziani
72
Receiver Rick Graziani
73
Looking at Options doesn’t help
Rick Graziani
74
Click on Link… Rick Graziani
75
Sites to check for hoaxes
Rick Graziani
76
Rick Graziani graziani@cabrillo.edu
77
Rick Graziani graziani@cabrillo.edu
78
Rick Graziani graziani@cabrillo.edu
79
Rick Graziani graziani@cabrillo.edu
80
Rick Graziani graziani@cabrillo.edu
81
Rick Graziani graziani@cabrillo.edu
82
Rick Graziani graziani@cabrillo.edu
83
Wireless, and Security CS 1 Rick Graziani
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.