Wireless networks has never been taken seriously because we have always been using wired networks mostly till his date. wireless networks can be easily exploited by hackers as compared to any wired network and reason is simple ,our wireless technology can be accessed by anyone who has a device with wireless capabilities and then can abuse the information stored on network, but when it’s a wired network, then the person has to come down physically and connect to that network. Although , hackers know the tricks of penetrating in those networks , you won’t be targeted easily.
So, there are the many important of wireless security in day to day life. Some of them are:
- It is mainly useful in online banking services. while we use online banking , there may be a chance to leave lot of traces which can reveal lots of account related information. And same goes in online shopping too.
- Your internet connection may be misused by many other people mainly by hackers , and they increase the cost of bandwidth and you may end up paying huge amount bills. There can be case where nasty people may try to send your internet connection to send spam and then you’ll be held liable for that.
So to secure home wireless network, there are few things to do to ensure that you ll not give easy access to those who are eyeing on free internet connection or some important information stored in your computer.
- Changing the SSID: SSID [ A service set identifier , or SSID , is a name used to identify the particular 802.11 wireless LANs to which a user wants to attach.] is a case sensitive name used to identify a wireless network and it has be used by each and every device in that network. By default, it is in manufacturer name but it is advisable to change that and make sure you don’t change it to anything identifiable: e.g.your name, address ,etc.
- Use WPA OR WPA 2: when it comes to security in wireless then prefer to use WPA or WPA 2 over WEP .WEP is vey easy to break as compared to WPA or WPA 2. WEP is older and WAP is newer and WAP2 is the newest.
- Use a strong and long key : with WPA , you have to specify a pre- shared key and which acts as a password to your network.
So it is important to secure wireless network than using it.
To Use computers, ATM's, email we need a password. To keep our personal data and information and protect from others we need password. If we enter wrong password or sometimes we forget the password it replied as "Did you forget your password" or "Username and password do not match" or Invalid user name or password". To avoid these here the steps to remember the password easier.
Avoid Personal Information: Dont use your first, middle or last name and nickname. It would be easy for a person who know's you to guess ur password. So create new words and use it.
Mix character: Mix different characters like caps, small letters, numbers, symbols (&, %, $). Create password easily and it can be typed quickly without seeing keyboard.
Use first words from ur favourite song/poem: Choose first words of the song and use it in caps or small letters. (Hasiley, varayo etc.,)
Use Different Passwords: Change your password 30 to 60 days. Use different password. Don't reuse your old password at least for a year.
Online security tips
1. Never reply to unknown sender like you have won prize type emails.
2.Never share your email id without any solid reason.
3.You do not note down password anywhere in your draft it can be hacked by hackers.
4.Always use BCC (Blind carbon copy) to send group email so other can not see your email list.
5.Always use low limit credit card for online shopping so if any time problem come then there is low chances of big loss.
6.Never copy sensitive data by using cntr+c.
7. Do not register on that site which demand money for registration.
8.Do not accept any friendship request blindly.
Hi friends, let us now discuss about SMART HOME SYSTEM which comes under the technology ARTIFICIAL (AMBIENT) INTELLIGENCE.
We are on the verge of an age of convergence, and the very first place you will interact with the new technologies will be at home. The most important room in the house, the living room, is where the majority of gadgets being made are targeted. This is because this is the room where you and your family spend most of waking hours-seeking entertainment. The gadgets will be controlled by the house CPU and will automatically follow you as you move around the house- switching on displays and when some one enters a room and switching of once every one leaves.
The Hallway /Entrance:
The logical place for the main home security panel is somewhere near the front door. This will merely control the security settings of the house, such as turning on or off the movement’s sensors out sides, setting the burglar alarm, and auto locking the house at predefined times. All the settings will also be accessible from anywhere else in the house using touch sensitive video output devices, and entering the correct user name and password combinations.
The main CPU will govern the security settings as well as other important semi-Ambient intelligence functions such as privacy and data synchronization. Using secured wireless networks the house will also connect to various other devices, Such as the entertainment centre in the living room to send its instructions about what moves you requested for the evening, are what audio list is most popular at this time of day, and on this day of the week.
The house CPU will also monitor the external security camera and watch for movement or people approaching the doors or windows. You will be able to set it to pop up a visual of the person approaching on the video output device in the room you are currently in, while the speakers will play a soft alert sound.
WORKING PROCEDURE OF SMART HOME SYSTEM:
Architecture reveals the working procedure of Smart Home System and how it protects the home from burglars.
Smart Home System describes how the ambient intelligence, is implemented in securing home from the intruders, and how to handle unwanted calls using Voice Recognition and Visual Recognition. For communication we use Wi-Max and Wi-Fi wireless technologies. In ‘Smart Home System’ we have induced a niche i.e., if a person comes to the home, he is inspected by the sensor devices and then the device categorizes the user (Known, Unknown and Expected) based on their preloaded information, where it provides the appropriate information to the user instead of owner. It also provides options for user to communicate with the owner, then according to the option the intimation takes place. This method is also implemented in attending the phone calls, where it uses a series of queries to identify a person, instead of his visual recognition. The Smart Home’s Security System will automatically intimate’s to the nearest police station and the owner by means of a ‘Burglar Alarm’, only if any illegal crime has been committed by the robberies.
Intro
Internet, a virtual world online, is built actually on trust. When we are communicating or getting & sending information with other people online, we don’t actually see the people. But we trust that they are who they say they are. But trust is not enough when it comes to financial transaction or other important communication. But there are crackers and hackers, scammers & con artists in an around us. They are very much active to steal credit card number or our personal & financial information or business secrets information. On the other hand business needs to know that the person sending a data, that is really is who he says he is or an imposter who has managed to steal a data from some one.
Here DIGITAL CERTIFICATE comes to the picture. It is an attachment to an electronic message used to verify that the person sending information, accredit card number or anything over the internet really is who he claims to be. The certificates place on a person’s hard disk and using an encryption technology, create a unique digital certificate for each person. When some one sends email or goes to a site with a digital certificate, that certificate presented to the site or attached to the email and it validate that the user is who he claims to be.
Due to the use of powerful encryption technology this certificates are quite safe & secure. Probably it is much more safe & secure than the real life signature. In real life signature can be forged but in Internet digital certificate can’t be forges.
Certificate Authorities (CA)
Certificate authorities are an independent, recognized and mutually trusted third party who issued Digital Certificate and guaranteed that the person or site is who it claims to be.
The Digital Certificates contains:
Name of entity
Address of entity,
The certificate’s serial number,
Public Key,
Expiration Date, and
Digital Signature,
The information has been encrypted in such a way that it makes unique for each person. The most widely used standard for Digital Certificate is X.509 and most well known certificate authorities are VeriSign (www.verisign.com) and Thawte (www.thawte.com).
How to Creating the Certificate
Step 1: The certificate authorities verify that the public key belongs to a specific company or individual and the through details validation process it is determines that the company or individual is who it claims. It depends on the CA and on the level of certification.
Step 2: After completion of details validation CA creates an X.509 certificate that contains CA and subject information including the public key. The CA signs the certificate by creating a hash value and encrypting the hash value with its private key. The encrypted hash value is called a "digital signature," and when placed into the X.509 certificate, the certificate is said to be "signed." Private Key is very important & CA keeps it very secure because if it is discovered, false certificate would be created.
Public key or Cryptography
Every packet of data sent over the Internet through many public networks, that means access to these packets is not private. So when highly confidential information such as corporate data or credit card numbers, which is transmitted across the Internet, are not save. So the Internet will never be a secure place to do business or send private data, unless there is some way to protect that kind of information.
To protect the confidential information software developers develop encryption & decryption that is information is altered in such a way that to any one other than the intended recipient it will look like meaningless garbage. Again the information is also turned back into the original message by the recipient and only by the recipient. Many complex cryptosystems have been created to allow for this kind of encryption & decryption.
The hearts of cryptosystems are the keys. Keys are secret values that computers use in concert with complex mathematical formulas called algorithms to encrypt and decrypt messages. The concept behind the keys is that if some one encrypts a message with a key, only some one with matching key will be able to decrypt the message.
There are two common encryption systems: secret-key-cryptography, i.e symmetric cryptography, and public-key-cryptography, i.e. asymmetric cryptography. The most common secret-key cryptography system is the Data Encryption Standard (DES).
How to verify the Certificate
Signed certificate is verified by the recipient’s software, which is mainly the recipient’s web browser. The list of CA’a and their public keys is maintained by the web browser. Web browser uses this appropriate public key decrypt the signature back into the digest. It recomputed own digest from the plain text in the certificate & compares the two. Certificate is verified if both the digest match & the public key in the certificate are assumed to be the valid public key.
VeriSign introduced the some new concept of classes of digital certificate
Class 1 - For Individual
Class 2 - For company or organizations-Identity proof required
Class 3 - For servers & software signing
Class 4 - For online business transactions between two companies
Class 5 - For private or governmental security
Digital ID is valid for one year & after that every software has to be resigned. To avoid this companies have introduced time stamping services. Once the software has been time stamped it is not required to resigning the software after Digital ID expires.
Below is picture if a user receives an unsigned component distributed via the Internet?
The following will occur
- If security settings are set on "High," the client application will not permit the unsigned code to load.
- If security settings are set on "Medium," the client application will display a warning like this screen:
Below is the picture if a user receives a signed component distributed via the Internet?
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 109 of 193