Safe Browsing at SIIT.

Slides:



Advertisements
Similar presentations
Practically, Internet can be described as a multifunctional tool since we can use it for several purposes, such as: Seeking useful information Contacting.
Advertisements

Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
DSL-2870B How to Change ADSL Username and Password in your modem router How to Change Wireless Channel in your modem router How to Open Ports in your modem.
INTERNET SAFETY.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Parzoof A social networking website for students.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
How to send request for activating your Hotmail account go to site 
E-SAFETY QUIZ.
E-SAFETY BY HARRY BELTON My tips on how to stay safe on the internet!!!
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
How the Internet Works CPA. Internet Addresses How do you get to the school’s website? What you as the user sees is a web address or URL – Uniform Resource.
Adapted from Computer Concepts, New Perspectives, Thompson Course Technology EDW 647: The Internet Dr. Roger Webster & Dr. Nazli Mollah 24 Cookies: What.
Welcome message. The background image would be an image of Electronic Circuit And have a flash action script to animate 0 and 1. This site would be for.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
Feedback #2 (under assignments) Lecture Code:
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
1. Go to 2. Complete the requested information.
Network Security, CS6262 Richard G. Personal Information Masquerading, Profiling, Snooping.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Northwest Nazarene University introduces PDLearn The CPD’s web access course selection and registration system for students and instructors Instructor.
Ethical Hacking: Hacking GMail. Teaching Hacking.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
Educational Networks What are they and why are they important?
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Wireless Security A lab that actually works! Anne Hewitt Oscar Salazar A lab that actually works! Anne Hewitt Oscar Salazar.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Internet safety By Kyle Allan. Top tip No:10 Don’t give out personal information such as a : Phone numbers and also addresses.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Robert Crawford, MBA West Middle School.  Describe ways criminals obtain passwords  Discuss ways to protect your computer from being accessed by others.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
 Things you may not know…  Why should we be secure?  How to secure your computer  Security Types.
Doha - 19/08/2014 Alessandro Scarafile Field Application Engineer Lorenzo Invernizzi Field Application Engineer Emad Shehata Key Account Manager Key Account.
Authentication & Authorisation Is the user allowed to access the site?
Ideas for Seafood Buffet Menu
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
How to stay safe using the internet and app’s?
Go to youtube and search “Code.org internet videos”
Arizona’s Fly Fishing Portal
Encryption 1-way String Encryption Rainbows (a.k.a. Spectrums)
Password Management Limit login attempts Encrypt your passwords
Everything You Wanted to Know About Encryption in Just 10 Minutes
A Wireless LAN Security Protocol
How to Check if a site's connection is secure ?
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
BP5 – encryption - Fun gym
Uses Of Encryption Algorithms
Advanced Penetration testing
The Social Networking revolution
BP5 – encryption - Fun gym
Protocol ap1.0: Alice says “I am Alice”
Bethesda Cybersecurity Club
Django Users and Registration
Wireless Access Points
Active Man in the Middle Attacks
Unit 3: Civil War
CS2911 Week 8, Class 1 Today Week 8, Lab period Muddiest Point
Presentation transcript:

Safe Browsing at SIIT

the Internet Explain web browsing and Internet structure Here is the web page containing your news feeds Response http://www.facebook.com/ Send me the web page of my news feeds the Internet Request wsiit Explain web browsing and Internet structure You - WiFi AP - Internet - Server Send request for web page Receive web page in response

the Internet Another example of web browsing, this time with login Login as 5722123456 with mysEcretpassw0rd the Internet Request wsiit Another example of web browsing, this time with login Response Here is the web page for registration

Can someone else see the web pages you are visiting?

the Internet wsiit Demo of wireless packet capture

Request Request Response Response

When using WiFi, assume everyone nearby can “see” everything you do on the Internet the websites you visit: www.YouShouldNotBeHere.com the information on web pages: Account balance = 1,000,000,000 Baht the comments you post: Dr Steve is the worst lecturer ever! the passwords you submit: 5722123456, mysEcretpassw0rd

unless you use encryption When using WiFi, assume everyone nearby can “see” everything you do on the Internet unless you use encryption WiFi Encryption: WPA Web Browsing Encryption: https

Encryption changes the message so that only those with the same key can read it Encrypt with key Request a6i#l)P1 a6i#l)P1 9G<3t_da; 9G<3t_da; Decrypt with key Response

Use HTTPS when accessing “important” websites Use WPA in your own WiFi network

Man-in-the-Middle Attack on HTTPS Facebook thinks I am you You think I am Facebook fake_wsiit Facebook gives “you” ( ) the key You receive the key from “Facebook” ( ) Everything encrypted with the key can be decrypted by attacker ( )

Beware of security warnings! Especially for websites that don't normally give a warning

Use your powers for good Safe Browsing with WiFi Assume everyone can see what you are doing Use HTTPS when accessing “important” websites Use WPA in your own WiFi network Beware of security warnings when using HTTPS Use your powers for good Bi Sam Dana Steve Linux mitmproxy