Privacy in Wireless Networks

57 %
43 %
Information about Privacy in Wireless Networks
Technology

Published on September 21, 2007

Author: mboman

Source: slideshare.net

Privacy in Wireless Networks Keeping your private data private

About Me 7 years in IT Security Principal Investigator for SIG 2 SoHo Honeypot project Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University Maintaining several personal websites http://proxy.11a.nu http:// www.securitytinker.com

7 years in IT Security

Principal Investigator for SIG 2 SoHo Honeypot project

Working on innovative ideas at the Standard Chartered Innovation Lab at Singapore Management University

Maintaining several personal websites

http://proxy.11a.nu

http:// www.securitytinker.com

Agenda Threats to your privacy Technical solutions how to keep your data private

Threats to your privacy

Technical solutions how to keep your data private

Who are we protecting our privacy from? Individuals Corporations Governments

Individuals

Corporations

Governments

Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points

Data interception

Man-in-the-middle attacks

Fake access points

Sniffing the air Interception of Email Instant Messaging Web Surfing

Interception of

Email

Instant Messaging

Web Surfing

Anonymous Internet Access The How-To Guide

Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites

Any website using SSL is safe from prying eyes

Make sure that SSL certificate validates

Be aware of mixed-content sites

Verify SSL usage in the browser

Using VPN Running your own VPN at home-office Commercial VPN providers

Running your own VPN at home-office

Commercial VPN providers

VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server

TOR - The Onion Router History How It works Pitfalls

History

How It works

Pitfalls

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware

Your data can easily be intercepted

Protect yourself using

SSL enabled websites

VPN tunnels

TOR Networks

Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware

Questions & Answers Slides @ www.securitytinker.com Mail @ [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/

Slides @ www.securitytinker.com

Mail @ [email_address]

These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/

THANK YOU!

Add a comment

Related presentations

Related pages

A Framework for Location Privacy in Wireless Networks

Keywords: Location privacy, anonymity, wireless networks, ad hoc network routing, ... location privacy represent important problems in wireless networks.
Read more

Security and Privacy in Emerging Wireless Networks

Security and Privacy in Emerging Wireless Networks Di Ma Computer and Information Science Department University of Michigan-Dearborn dmadma@umd.umich.edu
Read more

Security and Privacy in Mobile and Wireless Networking ...

Mobile and Wireless communication networks offer organizations and users several benefits, such as portability, mobility and flexibility, while increasing ...
Read more

Online Privacy: Using the Internet Safely | Privacy Rights ...

1. Online Activities and Your Privacy2. Using Wireless Networks and Wi-Fi3. Passwords4. Resources 1. Online Activities and Your Privacy
Read more

Network Security - Home, Wireless and Internet Network ...

As networks become an integral part of everyone's lives, advanced network security technologies are being developed to protect data and preserve privacy ...
Read more

Security and Privacy Vulnerabilities of In-Car Wireless ...

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire ... Wireless networks are being integrated into the modern automobile.
Read more

Peripheral Privacy Notifications for Wireless Networks

But because our actions can now be represented in the grammar of computers, they are more susceptible to interception and storage [3]. By viewing privacy ...
Read more

ACM Conference on Security and Privacy in Wireless and ...

About ACM WiSec 2016. As wireless and mobile networking becomes ubiquitous, security and privacy become increasingly critical. The focus of the ACM ...
Read more

Public Wireless Networks — How to Stay Safe | Microsoft ...

Learn how to stay safe while connected to public wireless networks. Read about tips to keep your computer and information safe.
Read more

Security and Privacy Protection in Wireless Sensor Networks

31-2 Handbook of Sensor Networks such mechanisms must be tailored to the corresponding sensor system architectures and security threats specific to a ...
Read more