Wednesday, January 9, 2013

Meeting minutes


 

Date of meeting: 31th Oct 2012

Time of meeting: Start at: 2:40; Finish at: 3:00

Venue: W104

 

 

Present:       Ahmad Al Suwaidi (Chair); Abdulla Ibrahim (Minutes taker); Faisal Al Hosani; Khamis (Participants)

 

1                    Welcome, apology for being late, Ahmad introduced the topic of the meeting which is Emiratization

 

2                    Emiratization Problems:

  

·                           Faisal started to discuss the problem of why students doesn't find jobs

·                           Ahmad added reasons of why student's don't want to continue studying

·                           Khamis discussed the market analysis where some students join programs that they don't know about just to meet their friends

·                           Faisal mentioned that students believe that private sectors don't fit with their needs. For example, overtime working hours

 

 

3          Emiratization Solutions:

 

·        Faisal decided that colleges and universities should make more orientations to enhance the graduate students to work

 

 

4         Actions:

 

·        Ahmad divided the work with the group members

·        Faisal will do a research (survey) about how many students demanded for a job and have they got it?

·        Khamis will do an analysis about this research

·        The group will give feedbacks of the research in the next meeting

                                                    

 

 

5       Date of the next meeting will be on the 7th of Nov 2012 at 2:40 PM 

Meeting Agenda


LSEC N307                  Meeting Assessment Agenda           Section: CMH

                                   

Date of meeting: 31th Oct 2012

Time of meeting: Start at: 2:40, Finish at: 3:00

Venue: W104

Group members:        GogoBoys

Chair: Ahmad Al Suwaidi       

Minute's taker: Abdulla Ibrahim       

Participants: Faisal, Khamis

 

 Venue preparation: Table, 4 Seats, Paper's     

Topic: Emiratization – finding jobs for students

Agenda:                                    

1          Why graduate students don't find jobs? (5 minutes)

2          Why some students don't want to continue studying instead they want to work? (3 minutes)

3          Analyze the market (5 minutes)

4          Private sectors opening up jobs for local graduate students (3 minutes)

5          Finding a solution to get these student jobs in their fields (4 minutes)

 

Objectives:

Possible Action Points:        

1-      Create a rotation center in different fields

2-      Setup committees

 

 

Course self-reflection


Self-reflection

 

 

In this semester I studied many different fields in my major. However, studying in this course taught me how to do things I’m not aware of and made me improve in some skills.

 

Before taking this course I use to have difficulties in researching anything. Researching skills has improved since our professor assigned us a project to research about a subject we were studying, and he also gave us tips on how to perfect our research.  To start applying for a job you need to do your own CV and in this course I learned how to do a professional CV thanks to our professor who was really patient in making us understand that the CV reflects the candidate. Also, preparing us for job interviews was one of the most important things we did in this course. The way the professor interviewed us was creative. Meetings were challenging to me, I was the chair and I had to act like I’m in charge of the meeting. It was really beneficial to have this meeting in that way. As a result, I have the courage to attend such meetings and do my job as a professional. Defiantly I will use these skills in the future and now I am more confident to actually use them.

 

To conclude, the N307 course is a must for all majors. It can help students do their job in a professional way. In my opinion, taking this course despite what the major is, will grant them the best way in dealing with their jobs.

 

Network Security




Wi-Fi Security



 


 

 

 

 

 

 

 

 

 

 

 

 

Group Name:               GoGo Boys

Group Members:

 

Faisal Al Hosani                 S200200506   

Khamis Mohammad       H00161040

Ahmad Al Suwaidi            H00059217

Abdulla Ibrahim                H00204550

Section:                                 CMH


 
 
 
TABLE OF CONTENTS

 

 

Introduction                     …….……………………………………………           P.3

History                            ……………………………………….…………           P.4

Intrusion through WI-FI              …………………….…………………….           P.4

Applying Security to Wi-Fi         …………………………………………..           P.5

Attacks on the Wi-Fi Network    ………………………………………….            P.6

Security mechanisms in Wi-Fi   .........………….………………………..           P.7


Network Security             ……….…………………………………………           P.8

Wi-Fi security in future    ………………………………………………….           P.8

What was learned            ………………………………………………….           P.9

Conclusion                      .....................................................................                 P.10

Bibliography                    …………………………………….……………           P.11

                                                                                                                       

 

                                                                                                         

 


 

Word Count: 2,047 Words

 


INTRODUCTION:


 

Information security is playing an important part in most of the companies at the moment. For example, you can't do your online transactions without using security methods such as SSL (Secure Socket Layer). However, without security your data would be spread out to anonymous people. These people can exploit your data to use it for their own goods. For instance, they would be to use your information in illegal way to login to your bank account. In this project, we are presenting the Wi-Fi security. The purpose of this project is to illustrate how the security is involved in the Wi-Fi. For starters, Wi-Fi is a shortcut for the name "Wireless Fidelity" which means it uses the radio waves to connect to the internet on a high speed connection. Wireless is now used in many devices that we are using it in our life such as video games consoles (PS3, Xbox, Nintendo Wii), laptops, personal computers (PC's), PDA's that are using Palm OS and new generation of smart phones such as Nokia, Android phones and I Phone. As for the PC's, you can connect to the internet without a wire by using Wireless adapters (ALFA & Genius wireless adapters are good examples). Back to 1991, the wireless was first named as the WaveLAN (Wave Local Area Network). NCR and AT&T Corporations were the first inventors of 802.11 technologies. First, we will start to discuss how the Wi-Fi was first discovered by these to corporations. After that, we are going to talk about the evolution of the Wi-Fi security and how most of the companies are now demanding the security of their wireless networks. Finally, we will look for solutions to minimize the risks of the intruders in the Wi-Fi field and to look for some solutions for lowering the Wi-Fi devices prices.

 

 

 

 

 

 

 

 

 

 

 

HISTORY:

Wi-Fi can be defined as a wireless network technology which it uses the radio waves in providing wireless network and internet connections like in televisions, cell phones and radio. The history of Wi-Fi dates back in the year 1991 in Nieuwegein, Netherlands. It was been invented by NCR Corporation with co-operation of AT&T where it was used at first by cashier system. Vic Hayes is the person who invented the Wi-Fi.  He was involved in the design of standards such as IEEE 802.11a, 802.11b, as well as 802.11g. The initial Wi-Fi had 11 Mb/s rate operating in 2.4 GHz band.  In the year 2000, they reached our market.  Currently, 802.11n is the most advanced standard used.

           

§  INTRUSION THROUGH WI-FI


                                

Without tight security and the right security system and tools, an individual or business data can be exposed to intrusion though various means. Intrusion through Wi-Fi may be through mis-configured access point, unauthorized/rogue access points, hacker hacking through the system or even a neighbor trying to access your unsecured Wi-Fi network.  All this and more may be intrusion means via Wi-Fi that can open a back-door into one’s or organization Wi-Fi and compromise important data.

 

"A major example of intrusion through Wi-Fi may be through packet sniffing where free programs such as tcpdump may be used in capturing any data that is sent through the wireless connection" (Lukasa, 2012). Therefore, any type of data/internet traffic that is unencrypted from the computer is transparently seen including any website visited. Additionally, tools such as nmap are used in scanning quietly into a machine system in attempt to establish services that were left open so as to break into them. "Sharing of remote screen and desktop allows for intrusion through visual observation of everything that happens in the machine" (Thought Leadership Summit Digest).

 

 

 

 

 

 

 

Unpatched exploits is another example of intrusion through Wi-Fi and especially open Wi-Fi where attackers runs codes arbitrary in one’s machine. "It involves the installation of spyware, the likes of keylogger" (Lukasa, 2012). Also, hijacking is another type of intrusion through open Wi-Fi through the concept of Man-In- The-Middle-Attack. Another machine intercept an individual computer traffic that is intended for a 3rd party, record or adjust it and later sends it. False HTTP’s connections are set up and cookies are sent in form of plaintext and broadcasted to the whole wireless connection.

 

§  APPLYING SECURITY TO WI-FI

 

There are various ways of protecting Wi-Fi from intrusion through implementing wireless intrusion prevention system for Wi-Fi security. To begin with, always use strong usernames and password for the network to avoid keeping it open for unauthorized access. Settings for default username and password for routers and access point given by web tools should always be changed to complicated ones hard for hackers to change. Additionally, avoid auto-connecting to open Wi-Fi networks such as neighbor’s routers or free wireless hotspots expose one’s computer to security risk. It is important to turn on WEP/WAP encryption, change the manufacturer’s default SSID immediately after configuring Wi-Fi as it’s commonly known to hackers as well as enable the physical address commonly known as MAC Address.

 


"To avoid Man-In-The-Middle attacks, always ensure the use of HTTPS in sending credentials and in establishing connections with different authenticated services" (Mitchell, n.d). It is important to always turn off Wi-Fi network during long extended period of Wi-Fi non-use through shutting down the network hence preventing hackers from breaking into your data. Also and importantly, firewalls should be enabled and turned on to prevent from hacking. Static IP addresses should be assigned to devices to avoid network attackers from obtaining IP addresses.


 

 

 

 


ATTACKS ON WI-FI NETWORKs:


 

This part deals is explaining some attacks which administrators of Wi-Fi networks have guarded against it. We have classified the attacks and this classification is important to understand the positive and negative points of the DAIR (Dense Array of Inexpensive Radios) security management system.

 

Eavesdropping:

The Eavesdropping is known as a passive attack. In this type of attacks, the attacker listens to the wireless network traffic and tries to gain useful information as much as possible. The listeners can use this technique to break the code. "Passive attacks are difficult, if not impossible, to detect and we do not address them in this paper" (Paramvir, 2006).

 

Intrusion:

The second attack is known as the intrusion which is an active attack. This attack allows the attacker to access the network in an illegal way, in other words; unauthorized access. By gaining a physical access to the wired network, an attacker can have the access to the corporate network by connecting the Wireless Access Point to it.

Denial of service:

Another type of active attacks is the DoS attack. This type of attack is known with by their possibility to be solved. In the Denial of Service attack can exploit several flaws in the IEEE 802.11 protocol. It can also gain access to the network and attacking the Access Points by mounting it.

Phishing:

Phishing is also an active attack. It is designed to extract private information by using various techniques. The DIAR system can detect this type of attacks.

 

 


SECURITY MECHANISMS IN WI-FI:


To avoid the main weakness is to use a small key for encryption. Studies have shown that an encryption infiltrator could threaten the Wi-Fi in three ways: by decrypting data that was in the air, by changing the data and before forging key to gain unauthorized access to network and Internet.

 

Encryption:

 

 

TKIP (Temporal Key Integrity Protocol) increases the size of the key even up to 128 bits and replaces this key and redistributed by the authentication server. To do this, the key is distributed to the client and the access point by the TKIP and sets up a key hierarchy. Then, the TKIP will generate a unique data encryption keys to encrypt every data packet that is connected through a wireless access point during the user's session.

 

 

Authentication:

 

 

Wi-Fi uses authentication with one of the Extensible Authentication Protocol types available today. The 802.1x technology is a port-based network access control method used in wired and wireless devices. In August 2001, it was adopted as a standard by the IEEE (Institute of Electrical and Electronics Engineers).

 

 

 

 

 

 

 

 

 

NETWORK SECURITY:

 

One of the main issues with wireless network security is known as the simplified access to the network. A couple years ago, we used to use the old way to connect to the internet which it is known as the traditional wired network such as (Ethernet). With wired networking a computer must gain access to the source with an Ethernet cable. On the other hand, Wi-Fi has also range depending on the router used, however it can’t get through concrete. If an attacker gained access to the Wi-Fi network he/she can initiate a DNS spoofing attack against any other user of the network by forging a response before the queried DNS server has a chance to reply.

 

WI-FI SECURITY IN FUTURE:

 

Nowadays, Wi-Fi devices are providing default username and password for the users. While people are always depending on it, they are still not aware of the attackers whom may take advantage of that. Because, most of the automatically username and password provider can set the same password for more than one account. However in future, Wi-Fi devices must have a friendly interface which allows the normal user to set his username and password manually when he first start using his new device.

 

Another important point is that the user must change his password every week minimum in his Wi-Fi devices to make it more secure and to prevent being hacked by using different methods of encryption rather than depending on the WEP or by using the virtual private network (VPN).

 

Unfortunately, encryption handles a great amount of bandwidth. Because of this, some people are depending on controlling access to their WLANs based on the MAC address of the device that is requesting the access to the internet. "The major flaw with this approach is that the MAC address is just a 12 digit long HEX number that can be viewed in clear text with a network sniffer program" (Roger, 2012). A hacker will have an easy entrance to the victim's PC by just waiting for the device to connect to the WLAN and use the duplicated MAC address to login to the normal user PC.

 

 

 

§  WHAT WAS LEARNED:

By going through the project, we have now the knowledge and the experience in how to avoid being hacked. We have found several tips to prevent hackers:

 

1-    Use a strong password: By mixing upper and lower cases with numbers, a hacker will have the difficulty to guess your password or even by using brute-forcing attacks programs. The advantage of this is to frustrate the attacker as much as possible.

 

 

 

 

 

 

 

 

2-    Clear the web browser cookies: Always clear your cookies from the PC you are in before you logout or leave it.

 

 

 

 

 

 

 

 

3-    Keep your computer up-to-date: Microsoft Windows updates are very important because it checks for any vulnerability in the computer.

 

 

 

 

 

 

 

4-    Update your password: Changing your password every week or whenever you feel it is necessary to be changed will keep you safe from password guessers. However, most of the people are not used to change their passwords after the first time they set it up.

 

 

 

 

 

 

 

 

 

5-    Don't use common usernames: users that use the word "Admin" or "Administrator" are making the job easy for the hacker. It's like they have done the 50% of the job.

 

6-     The use of SSL or HTTPS: When you want to do online payments from websites, make sure that the address bar starts with https:// or the color is green  such as the example below:


 

 

 

CONCLUSION:

All in all, we know now the first step for implementing the wireless network is by understanding the threats or the attack on the Wi-Fi network. One of these threats is known as DoS (Denial of Service attack). Even thought that users have the ability to access the internet and share their files and folders from home, college or cafe they are still in risk of being attacked by these intruders. We are now able to limit the impact of these attacks by using several security standards which we can combines three-party authentication with tunnels in the network. Moreover, securing opened wireless ports is very important to reduce the risk of hacking. We recommend you to keep your network safe and secured from intruders.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

BIBLIOGRAPHY:

Bahl, P., Chandra, R., Padhye, J., Ravindranath, L., Singh, M., Wolman, A., et al. (2006). ATTACKS ON WI-FI NETWORKS. Enhancing the Security of Corporate Wi-Fi Networks Using DAIR (p. 2). Uppsala, Sweden: ACM.

 

J. Bernstein. (n.d.). DNS forgery. djbdns. Retrieved November 27, 2012, from cr.yp.to/djbdns/forgery.html

 

Janith. (n.d.). 10 Tips to Prevent Hackers. Blogussion. Retrieved November 27, 2012, from http://www.blogussion.com/blogging-tips/ten-tips-to-prevent-hackers

 

Jensen, J. (2007, October 26). 802.11 g: Pro's & Cons of a Wireless Network in a Business Environment. Networkbits: Network and Technology Articles. Retrieved November 27, 2012, from http://networkbits.net/wireless-printing/80211-g-pros-cons-of-a-wireless-network-in-a-business-environment/

Lukasa. (2012). How does a hacker in a public WIFI actually view your computer? Retrieved from http://superuser.com/questions/282079/how-does-a-hacker-in-a-public-wifi-actually-view-your-computer


 

Mitchell, B. (n.d). 10 Tips for Wireless Home Network Security. Retrieved from http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm

 

Paramvir. (2006). ATTACKS ON WI-FI NETWORKS. Enhancing the Security of Corporate Wi-Fi Networks Using DAIR (p. 2). Uppsala, Sweden: ACM.

 

Problems and solutoions to WiFi security. (n.d.). WiFiNotes.com. Retrieved November 27, 2012, from http://wifinotes.com/wifi-security-problems-and-solutions.html

                                           

Publishing Team. (2003, June 25). Wi-Fi Protected Access (WPA) NeedToKnow - Part II. Tom's Guide: Tech For Real Life. Retrieved November 29, 2012, from http://www.tomsguide.com/us/wi,review-149-2.html

 

 

 

 

 

 

Roger. (2012). How to secure a wireless network. TechRadar. Retrieved from http://www.techradar.com/news/world-of-tech/roundup/how-to-secure-a-wireless-network-1075710

 

Thought Leadership Summit Digest. (n.d) . Wi-Fi Security: Intrusion Detection and Prevention: A Webtorials Thought Leadership Summit Digest. Retrieved from http://www.webtorials.com/main/resource/papers/summits/WIPS/WIPS-Digest-Final.pdf

 

Wavesight & Wireless Security. (2005, December 13). Wavesight. Retrieved November 26, 2012, from www.wavesight.com/Support/Knowledge_Base/Wireless_Security.asp

 

Wi-Fi. (n.d.). The Tech Terms Computer Dictionary. Retrieved November 28, 2012, from http://www.techterms.com/definition/wifi

 

Wi-Fi - Wikipedia, the free encyclopedia. (n.d.). Wikipedia, the free encyclopedia. Retrieved November 25, 2012, from http://en.wikipedia.org/wiki/Wi-Fi

 

Wi-Fi Protected Access: Strong, standards-based, interoperable security for todayĆ¢€™s Wi-Fi networks (p. 6). (2003). Security for homes and small offices. Wi-Fi Alliance.

 

Wright, J. (2007, September 5). Security Laboratory: Wireless Security. SANS Technology Institute. Retrieved November 26, 2012, from http://www.sans.edu/research/security-laboratory/article/wireless-security-1

                                                                                            

 

APA formatting by BibMe.org.