View
213
Download
0
Category
Tags:
Preview:
Citation preview
Wireless Network SecurityPRESENTED BY:
Mr. Michael J. HohnkaWireless Technologies Department HeadCommunications and Imaging Division
Applied Research Laboratorymjh147@psu.edu
(814) 867-4145
The Wireless Technologies Department is part of the Communications and Imaging Division within the Communications, Information and Navigation Office at ARL.
In the Department...
We perform basic and applied research, exploratory development, and advanced development in support of program sponsors
We champion the transfer of advanced technologies to naval acquisition programs and fleet operations as well as to other government agencies and the private sector
Mission
One hundred years ago.…
April 14/15, 1912 Titanic hits iceberg and sinks in North Atlantic.
~ 1500 lives lost
Let’s look at the role that wireless played in this disaster
Titanic Wireless Technology
Consisted of “Marconi” set
Comms simply by Morse Code (…---…)
Enabled comms to other ships in vicinity and shore-based stations
After Titanic hit iceberg, SOS sent almost continuously until ship ultimately sunk
SS Californian nearby (~10 miles)
Why didn’t Californian aid Titanic?
Titanic sent SOS for ~ 3 hours
Californian certainly capable of receiving SOS
Californian had Marconi set powered off for night!
It was not the technology that failed; it was failure in the way that the technology was used
Laws were then implemented requiring 24 hour monitoring of Marconi systems
This was an attempt to correct the way that the technology was used
What does this have to do with Network Security?
Titanic Wireless Security Issues
Was there concern over lost/stolen Marconi devices?
How about malware and viruses getting inadvertently loaded onto a Marconi system?
Were open Wi-Fi networks and Public Hotspots an issue?
What about the problems associated with a personal Marconi being put on a company network?
Titanic Wireless Security Issues
Was there concern over lost/stolen Marconi devices?
How about malware and viruses getting inadvertently loaded onto a Marconi system?
Were open Wi-Fi networks and Public Hotspots an issue?
What about the problems associated with a personal Marconi being put on a company network?
The answer to all of these questions is obviously NO.
But they are all concerns 100 years later with current wireless devices!
BYOD
Bring Your Own Device
We are in an era where a personal device can be used to access corporate data
Email, appropriately mapped storage, Intranet
Basically to do work outside of work
What’s the Big Deal?
According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers……
BUT!!!!BUT!!!!
What’s the Big Deal?
According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers……
Studies also show that consumers are lax about mobile security……
BUT!!!!BUT!!!!
What’s the Biggest Risk?
Is it malware or viruses?
• If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.
What’s the Biggest Risk?
Is it malware or viruses?
• If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.
NO!NO!
What’s the Biggest Risk?
Is it malware or viruses?
• If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.
Is it using your device on an open Wi-Fi or public hotspot?
• In 2011 the UK based newspaper The Guardian set up a mock Wi-Fi hotspot in an airport and was easily able to obtain user information ranging from email passwords to credit card information.
NO!NO!
What’s the Biggest Risk?
Is it malware or viruses?
• If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.
Is it using your device on an open WI-FI or public hotspot?
• In 2011 the UK based newspaper The Guardian set up a mock Wi-Fi hotspot in an airport and was easily able to obtain user information ranging from email passwords to credit card information.
NO!NO!
NO!NO!
The Biggest Risk
It is a lost or stolen device
• “Security experts agree most of the threats to mobile devices come in the form of people losing their devices or having them stolen”
- eWeek.com, “Dealing with Enterprise Mobile Security” Oct 6, 2010
Recommended