SlideShare a Scribd company logo
Privacy in Wireless Networks Keeping your private data private
About Me 8 years in IT Security Principal Investigator for SIG2 SoHo Honeypot project, Singapore Singapore Security Meetup Group Organizer IT Security Specialist at a retail firm in Sweden My website: http://michaelboman.org
Agenda Threats to your privacy Technical solutions how to keep your data private
Who are we protecting our privacy from? Individuals Corporations Governments
Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points
Sniffing the air Interception of Email Instant Messaging Web Surfing
Anonymous Internet Access The How-To Guide
Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites
Verify SSL usage in the browser
Using VPN Running your own VPN at home-office Commercial VPN providers
VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
TOR - The Onion Router History How It works Pitfalls
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
Questions & Answers Slides:  michaelboman.org eMail:  [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/
THANK YOU!

More Related Content

PPT
Privacy in Wireless Networks
PDF
Introduction to Personal Privacy and Security
PDF
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
PDF
10 Tips to Keep Criminals Out
PPTX
Why hackers love public Wi-fi
PPTX
Best Information Security Tips for Better Computing
PDF
Tadej Hren: IOT Ransomware
PPTX
Pretty good privacy - Email Security
Privacy in Wireless Networks
Introduction to Personal Privacy and Security
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
10 Tips to Keep Criminals Out
Why hackers love public Wi-fi
Best Information Security Tips for Better Computing
Tadej Hren: IOT Ransomware
Pretty good privacy - Email Security

What's hot (20)

PDF
Hacker Tricks: How You Can Protect Yourself
PPTX
Vishwadeep Presentation On NSA PRISM Spying
PDF
Public WiFi Hot Spots
PPTX
Security horrors
PPTX
Steganography
PPTX
Steganography
PDF
mcafee-10-steps-infographic-d2
PPTX
Internet security
PPTX
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
PDF
6 Security Tips for Using Public WiFi
PPT
Digigone Overview 080109
PDF
Tip sheet series – Ransomware attacks
PPTX
IT Security for Small Business
PDF
BAIT1103 Chapter 5
PDF
Zero trusted networks: Why permiterer security is dead
PDF
Security is a process, not a plugin (WordCamp Oslo 2018)
PDF
Security is a process, not a plugin (WordCamp Torino 2018)
PDF
Security is a process, not a plugin (WordCamp London 2018)
PDF
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
PPTX
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Hacker Tricks: How You Can Protect Yourself
Vishwadeep Presentation On NSA PRISM Spying
Public WiFi Hot Spots
Security horrors
Steganography
Steganography
mcafee-10-steps-infographic-d2
Internet security
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
6 Security Tips for Using Public WiFi
Digigone Overview 080109
Tip sheet series – Ransomware attacks
IT Security for Small Business
BAIT1103 Chapter 5
Zero trusted networks: Why permiterer security is dead
Security is a process, not a plugin (WordCamp Oslo 2018)
Security is a process, not a plugin (WordCamp Torino 2018)
Security is a process, not a plugin (WordCamp London 2018)
Fortinet NSE 4 fortigate ii certificate attendance cert 2 - nov 2016 - mikh...
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Ad

Similar to Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08 (20)

PPTX
Personal Internet Security Practice
PPTX
Securing & Safeguarding Your Library Setup.pptx
PPTX
Pichman privacy, the dark web, & hacker devices i school (1)
PPTX
online privacy
PPTX
The Ins, Outs, and Nuances of Internet Privacy
PPTX
Take Back Your Online Privacy: Simple Computer Security
PDF
Cyber security macau
PPTX
Internet Privacy
PPTX
Wireless Security
PDF
Security & privacy on the internet: things you should now
PPTX
Protect your Privacy
PPTX
Digital Defense for Activists (and the rest of us)
DOCX
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
PDF
Securing and Safeguarding Your Library Setup
PPTX
Online Privacy Threats to You and Your Family (NoCo IT Pros, April 2015)
PDF
Secure encryption in a wiretapped future
PPTX
Online Privacy: How to Protect Your Activity and Communications
PPTX
Privacy in private browsing mode
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
PDF
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
Personal Internet Security Practice
Securing & Safeguarding Your Library Setup.pptx
Pichman privacy, the dark web, & hacker devices i school (1)
online privacy
The Ins, Outs, and Nuances of Internet Privacy
Take Back Your Online Privacy: Simple Computer Security
Cyber security macau
Internet Privacy
Wireless Security
Security & privacy on the internet: things you should now
Protect your Privacy
Digital Defense for Activists (and the rest of us)
Protect Your Data_ Understanding Wireless Network Attacks PEN-210.docx
Securing and Safeguarding Your Library Setup
Online Privacy Threats to You and Your Family (NoCo IT Pros, April 2015)
Secure encryption in a wiretapped future
Online Privacy: How to Protect Your Activity and Communications
Privacy in private browsing mode
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
OSDC 2014: Michael Renner - Secure encryption in a wiretapped future
Ad

More from Michael Boman (20)

PPTX
How to drive a malware analyst crazy
PPTX
Indicators of compromise: From malware analysis to eradication
ODP
44CON 2014: Using hadoop for malware, network, forensics and log analysis
PDF
DEEPSEC 2013: Malware Datamining And Attribution
PPT
44CON 2013 - Controlling a PC using Arduino
PDF
Malware Analysis on a Shoestring Budget
PPTX
Malware analysis as a hobby (Owasp Göteborg)
PPTX
Malware Analysis as a Hobby
PPTX
Malware analysis as a hobby - the short story (lightning talk)
KEY
Sans och vett på Internet
PDF
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
PPT
Hur man kan testa sin HTTPS-server
PPT
OWASP AppSec Research 2010 - The State of SSL in the World
PPTX
Enkla hackerknep för testare
ODP
USB (In)Security 2008-08-22
ODP
Automatic Malware Analysis 2008-09-19
ODP
Overcoming USB (In)Security
PDF
Network Security Monitoring - Theory and Practice
ODP
Introduction To Linux Security
ODP
How to drive a malware analyst crazy
Indicators of compromise: From malware analysis to eradication
44CON 2014: Using hadoop for malware, network, forensics and log analysis
DEEPSEC 2013: Malware Datamining And Attribution
44CON 2013 - Controlling a PC using Arduino
Malware Analysis on a Shoestring Budget
Malware analysis as a hobby (Owasp Göteborg)
Malware Analysis as a Hobby
Malware analysis as a hobby - the short story (lightning talk)
Sans och vett på Internet
Blackhat USA 2011 - Cesar Cerrudo - Easy and quick vulnerability hunting in W...
Hur man kan testa sin HTTPS-server
OWASP AppSec Research 2010 - The State of SSL in the World
Enkla hackerknep för testare
USB (In)Security 2008-08-22
Automatic Malware Analysis 2008-09-19
Overcoming USB (In)Security
Network Security Monitoring - Theory and Practice
Introduction To Linux Security

Recently uploaded (20)

PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PPTX
The various Industrial Revolutions .pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
OMC Textile Division Presentation 2021.pptx
Developing a website for English-speaking practice to English as a foreign la...
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
The various Industrial Revolutions .pptx
Getting Started with Data Integration: FME Form 101
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Architecture types and enterprise applications.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Hindi spoken digit analysis for native and non-native speakers
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Web App vs Mobile App What Should You Build First.pdf
1. Introduction to Computer Programming.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A comparative study of natural language inference in Swahili using monolingua...
OMC Textile Division Presentation 2021.pptx

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08

  • 1. Privacy in Wireless Networks Keeping your private data private
  • 2. About Me 8 years in IT Security Principal Investigator for SIG2 SoHo Honeypot project, Singapore Singapore Security Meetup Group Organizer IT Security Specialist at a retail firm in Sweden My website: http://michaelboman.org
  • 3. Agenda Threats to your privacy Technical solutions how to keep your data private
  • 4. Who are we protecting our privacy from? Individuals Corporations Governments
  • 5. Attacks against wireless networks Data interception Man-in-the-middle attacks Fake access points
  • 6. Sniffing the air Interception of Email Instant Messaging Web Surfing
  • 7. Anonymous Internet Access The How-To Guide
  • 8. Surfing with SSL Any website using SSL is safe from prying eyes Make sure that SSL certificate validates Be aware of mixed-content sites
  • 9. Verify SSL usage in the browser
  • 10. Using VPN Running your own VPN at home-office Commercial VPN providers
  • 11. VPN Packet Routing Site Unencrypted Link Encrypted Link VPN Server
  • 12. TOR - The Onion Router History How It works Pitfalls
  • 13. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 14. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 15. TOR Packet Routing TOR Directory Server Site 1 Site 2 TOR Node Unencrypted Link Encrypted Link
  • 16. Summary Your data can easily be intercepted Protect yourself using SSL enabled websites VPN tunnels TOR Networks Don’t forget Personal Firewalls, Anti-Virus and Anti-Spyware
  • 17. Questions & Answers Slides: michaelboman.org eMail: [email_address] These slides are licensed under Creative Commons Attribution-ShareAlike 3.0 http://creativecommons.org/licenses/by-sa/3.0/