Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

67 %
33 %
Information about Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Technology

Published on November 10, 2008

Author: mboman

Source: slideshare.net

Privacy in Wireless Networks Keeping your private data private

About Me 8 years in IT Security Principal Investigator for SIG2 SoHo Honeypot project, Singapore Singapore Security Meetup Group Organizer IT Security Specialist at a retail firm in Sweden My website: http://michaelboman.org

8 years in IT Security

Principal Investigator for SIG2 SoHo Honeypot project, Singapore

Singapore Security Meetup Group Organizer

IT Security Specialist at a retail firm in Sweden

My website: http://michaelboman.org

Agenda Threats to your privacy Technical solutions how to keep your data private

Threats to your privacy

Technical solutions how to keep your data private

Who are we protecting our privacy from? Individuals Corporations Governments

Individuals

Corporations

Governments

Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points

Data interception

Man-in-the-middle attacks

Fake access points

Sniffing the air Interception of Email Instant Messaging Web Surfing

Interception of

Email

Instant Messaging

Web Surfing

Anonymous Internet Access The How-To Guide

Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites

Any website using SSL is safe from prying eyes

Make sure that SSL certificate validates

Be aware of mixed-content sites

Verify SSL usage in the browser

Using VPN Running your own VPN at home-office Commercial VPN providers

Running your own VPN at home-office

Commercial VPN providers

VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server

TOR - The Onion Router History How It works Pitfalls

History

How It works

Pitfalls

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link

Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware

Your data can easily be intercepted

Protect yourself using

SSL enabled websites

VPN tunnels

TOR Networks

Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware

Questions & Answers Slides: michaelboman.org eMail: [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/

Slides: michaelboman.org

eMail: [email_address]

These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/

THANK YOU!

Add a comment

Related presentations

Related pages

Dynamic Route Failover | LAN, Switching and Routing ...

Dynamic Route Failover. ... you will use a private address space within your internal ... the networks behind your 3550s and 7206s different OSPF ...
Read more

Configuring an FTP Server behind Cisco | Firewalling ...

Configuring an FTP Server behind Cisco. ... We could do it here but I feel it's better to sort things out in private email and then ... 2008-08-08 16:31 ...
Read more

DHCP Server Callout DLL for MAC Address based filtering ...

Your wireless card and lan card will have ... Static Route to internal networks, ... to provide IPs to my private ...
Read more

The Birth Of A New Wireless Broadband Competitor ...

GigaOM directs our attention to the fact that a New York private equity firm plans to spend billions to build a new LTE (Long Term Evolution) wireless ...
Read more

AT&T's Stankey: U-verse Build Virtually Over - Company ...

Several companies highlighted plans to increase capital spending in pursuit of wireless data ... 2008-08-08 Washington, IL ·MTCO ... keeping ADSL when you ...
Read more

Daniel Suarez - Daemon: Bot-Mediated Reality - FORA.tv

Login here with the temporary account credentials included in your receipt ... Daemon: Bot-Mediated Reality. ... The Massive Amount of Data Available ...
Read more

CNBC: Sprint In “Not Informal” Talks to Sell Nextel - Tech ...

Faber says private equity funds (remember them?) that are “aligned with telecom” are among interested parties, […] WSJ. WSJ; WSJ Live. WSJ ...
Read more