Wireless Computing: Are you safe - PowerPoint PPT Presentation

1 / 28
About This Presentation
Title:

Wireless Computing: Are you safe

Description:

Co-founder Blue Water Technologies. Co-founder - TriGeo ... WSU, University of ... Each time, hordes of idiots pounce on it and break into every system ... – PowerPoint PPT presentation

Number of Views:43
Avg rating:3.0/5.0
Slides: 29
Provided by: atsush5
Category:

less

Transcript and Presenter's Notes

Title: Wireless Computing: Are you safe


1
Wireless Computing Are you safe?
  • John C. Shovic, Ph.D.
  • Computer Science
  • Eastern Washington University

2
John Shovic background
  • Co-founder MiloCreek
  • Co-founder Blue Water Technologies
  • Co-founder - TriGeo Network Security
  • Co-founder - AHA, bankCDA

3
John Shovic background
  • WSU, University of Idaho faculty
  • Skill set network security networks embedded
    systems coyote baiting

4
Is my software or system secure?
  • The theory states in the general case
  • You dont know for sure it is secure
  • Even more
  • You CANT know if it is secure
  • I call it
  • Job security

5
Security is a balancing act
Secure Computer
Usable Computer
6
How bad is it?
  • There are 10 15 more viruses detected every day
  • The average time for a computer on the net to be
    scanned is 45 seconds
  • 50 of successful intrusions happen from the
    inside (Firewalls do NO good there)

7
CSI/FBI Survey 2005(1999 results)
  • 90 (55) of respondents reported incidents
    (Reporting to LEO is down again!)
  • 10 (26) of respondents reported theft of
    proprietary information
  • Financial losses due to computer security
    breaches reached over 130 million (over 100
    million)
  • Virus loss still 1!

8
CSI / FBI 2005 Survey conclusions
  • Actual breaches are down
  • Losses are down slightly
  • Virus cost continues to increase as percentage of
    the problem
  • Survey does not include anything about home
    issues or small businesses
  • Overall problem is slightly worse than last year

9
Why do people use wireless?
  • No way to get a wire there
  • Convenience Meeting rooms
  • Large, sparse areas (warehouse)
  • Mobility Internet Café
  • Cheaper than wiring

10
Pros and cons
  • Pros
  • Cheap
  • No wires. Flexible
  • Cons
  • Cheap
  • Relatively slow
  • Shared bandwidth
  • Data is freely available in Air!!!!

11
Wireless
  • You can easily snoop on wireless connections
  • People do it all the time
  • Cyber Cafés
  • Airports
  • Ad-hoc Settings
  • Universities
  • WarDrives

12
(No Transcript)
13
(No Transcript)
14
Wake up call
  • Unaided Laptop
  • Range from access point 12 miles
  • In reverse we can sniff/join or control a
    wireless network at ranges of 12 miles,
    undetected
  • Record is now 54 miles!

15
WarDrives
  • Take your laptop and go cruising
  • EWU Network Security did this for the past 3
    years
  • 75 of wireless networks were WIDE OPEN
    (WWWD2004 found 61)
  • Home networks all over the place
  • One person had her address as the ESID!
  • Small business networks all over the place
  • Some were wide open!

16
(No Transcript)
17
Who are the bad guys?
18
Who is the enemy?
  • The Troubled Genius
  • The Evil Genius
  • Has a deep understanding of systems
  • Capable of finding obscure vulnerabilities in
    OSs, apps, and protocols, and exploiting them
  • Extremely skilled at evading countermeasures
  • Can dynamically adapt to new environments

19
Who is the enemy?
  • The Idiot (aka Script Kiddies)
  • Little or no true understanding of systems
  • Blindly downloads runs code written by T.E.G.
  • Can usually be stopped by calling his mother

Who do you think causes more damage?
20
doh!
  • The idiots collectively cause more damage because
    there are a vast number of them
  • Every time smart hackers find a new security
    hole, they make it public -- they have a publish
    or perish ethic
  • Each time, hordes of idiots pounce on it and
    break into every system they can find

21
Publish or Perishor, good help is not hard to
find30,000 hacker sites and counting!
(Deutchland uber alles!)
22
Sounds dangerous. Can you do anything?
23
Top 5 wireless security tips
  • Use WEP (Encryption)!!!!
  • Change default SSIDs and disable SSID broadcast
    and turn down power to what you need
  • Turn it off when you arent using it. Both the
    access point and your laptop
  • Watch your lights! Be suspicious
  • Keep your software updated (Do Windows XP SP2 and
    all updates from MS)

24
EWU Network Security class sequence
CSCD 333 Introduction to Networking
CSCD 433/547 Advanced Networking
CSCD 434/590 Network Security
CSCD 480/591 Information Warfare
25
Network Security /Information Warfare
  • Hack the Professor Week
  • Succeed? Get an Automatic A
  • Red Versus Blue Hacking Contest
  • Two teams trying to defend their servers and
    attack the other team
  • 3 p.m. to Midnight
  • Huge quantities of pizza and caffine consumed

26
(No Transcript)
27
Conclusions
  • Be careful with wireless
  • Watch out for the EWU WarDrive!
  • (Odd looking antennas!)
  • Computers and Networks are important
  • Educate yourself

28
Questions and Discussion
Write a Comment
User Comments (0)
About PowerShow.com