1 / 17

Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka

Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka Wireless Technologies Department Head Communications and Imaging Division Applied Research Laboratory mjh147@psu.edu (814) 867-4145. Mission.

Download Presentation

Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Network Security PRESENTED BY: Mr. Michael J. Hohnka Wireless Technologies Department Head Communications and Imaging Division Applied Research Laboratory mjh147@psu.edu (814) 867-4145

  2. Mission • The Wireless Technologies Department is part of the Communications and Imaging Division within the Communications, Information and Navigation Office at ARL. • In the Department... • We perform basic and applied research, exploratory development, and advanced development in support of program sponsors • We champion the transfer of advanced technologies to naval acquisition programs and fleet operations as well as to other government agencies and the private sector

  3. One hundred years ago.… • April 14/15, 1912 Titanic hits iceberg and sinks in North Atlantic. • ~ 1500 lives lost Let’s look at the role that wireless played in this disaster

  4. Titanic Wireless Technology • Consisted of “Marconi” set • Comms simply by Morse Code (…---…) • Enabled comms to other ships in vicinity and shore-based stations • After Titanic hit iceberg, SOS sent almost continuously until ship ultimately sunk • SS Californian nearby (~10 miles)

  5. Why didn’t Californian aid Titanic? • Titanic sent SOS for ~ 3 hours • Californian certainly capable of receiving SOS • Californian had Marconi set powered off for night! • It was not the technology that failed; it was failure in the way that the technology was used • Laws were then implemented requiring 24 hour monitoring of Marconi systems • This was an attempt to correct the way that the technology was used What does this have to do with Network Security?

  6. Titanic Wireless Security Issues • Was there concern over lost/stolen Marconi devices? • How about malware and viruses getting inadvertently loaded onto a Marconi system? • Were open Wi-Fi networks and Public Hotspots an issue? • What about the problems associated with a personal Marconi being put on a company network?

  7. Titanic Wireless Security Issues • Was there concern over lost/stolen Marconi devices? • How about malware and viruses getting inadvertently loaded onto a Marconi system? • Were open Wi-Fi networks and Public Hotspots an issue? • What about the problems associated with a personal Marconi being put on a company network? The answer to all of these questions is obviously NO. But they are all concerns 100 years later with current wireless devices!

  8. BYOD Bring Your Own Device • We are in an era where a personal device can be used to access corporate data • Email, appropriately mapped storage, Intranet • Basically to do work outside of work

  9. What’s the Big Deal? • According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers…… BUT!!!!

  10. What’s the Big Deal? • According to Forrester Research, more than half of US information workers now pay for their smartphones and monthly plans to do work for their employers…… BUT!!!! • Studies also show that consumers are lax about mobile security……

  11. What’s the Biggest Risk? • Is it malware or viruses? • If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January.

  12. What’s the Biggest Risk? • Is it malware or viruses? • If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. NO!

  13. What’s the Biggest Risk? • Is it malware or viruses? • If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. NO! • Is it using your device on an open Wi-Fi or public hotspot? • In 2011 the UK based newspaper The Guardian set up a mock Wi-Fi hotspot in an airport and was easily able to obtain user information ranging from email passwords to credit card information.

  14. What’s the Biggest Risk? • Is it malware or viruses? • If you own an Android phone or iPhone you’re 2.5 more times likely to accidently download malware today than you were in January. NO! • Is it using your device on an open WI-FI or public hotspot? • In 2011 the UK based newspaper The Guardian set up a mock Wi-Fi hotspot in an airport and was easily able to obtain user information ranging from email passwords to credit card information. NO!

  15. The Biggest Risk • It is a lost or stolen device • “Security experts agree most of the threats to mobile devices come in the form of people losing their devices or having them stolen” • - eWeek.com, “Dealing with Enterprise Mobile Security” Oct 6, 2010

  16. In Closing….. • Protect your device • Don’t be the “iceberg that sinks your company’s data!”

  17. The Applied Research Laboratory The Pennsylvania State University Questions? ARL Penn State P.O. Box 30 State College, Pennsylvania 16804

More Related