Site icon TechZilica ~ On the Edge

Technical perspective of risks using public Wi-Fi and how to stay safe

&Tab;&Tab;<div data-elementor-type&equals;"wp-post" data-elementor-id&equals;"562" class&equals;"elementor elementor-562" data-elementor-post-type&equals;"post">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<section class&equals;"elementor-section elementor-top-section elementor-element elementor-element-64dae73 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id&equals;"64dae73" data-element&lowbar;type&equals;"section">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-container elementor-column-gap-default">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8b0dc76" data-id&equals;"8b0dc76" data-element&lowbar;type&equals;"column">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-wrap elementor-element-populated">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-bdbf00d elementor-widget elementor-widget-text-editor" data-id&equals;"bdbf00d" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<p><em><span style&equals;"color&colon; &num;800080&semi;">A short thought piece on the potential cybersecurity risks of using public or unsecured Wi-Fi networks&period;<&sol;span><&sol;em><&sol;p><p><span style&equals;"color&colon; &num;ff9900&semi;"><em><span style&equals;"color&colon; &num;800080&semi;">Please don&&num;8217&semi;t assume I have considered all possible risks here&comma; this is only one perspective&period; 😊<&sol;span><&sol;em><br &sol;><&sol;span><&sol;p>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-4ff7533 elementor-widget elementor-widget-heading" data-id&equals;"4ff7533" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Intro<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-c2b96a3 elementor-widget elementor-widget-text-editor" data-id&equals;"c2b96a3" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<p>Networking is a complex and dynamic topic&comma; and an understanding of key concepts involved is important to make security decisions based upon it&period;<&sol;p><p>As network traffic moves around a network like from a router to a computer and then to a specific program running on the computer&comma; the traffic is &OpenCurlyQuote;encapsulated’ from the sender and then &OpenCurlyQuote;decapsulated’ by the receivers&period;<&sol;p><p>Network traffic is encapsulated so it can be interpreted by other computers&period; It is structured using a set of rules all computers on the network understand and these rules are called protocols&period;<&sol;p><p>Think of putting a letter in an envelope&comma; it is a standard size and has an address written in a standard format and the data contained is in a language both parties understand&semi; this is the protocol of sending a letter and computer networks operate is a very similar way&period;<&sol;p><p>Network traffic will be encapsulated multiple times&comma; as data is decapsulated the next layer of encapsulation of revealed and the data is passed to a lower-level system &&num;8211&semi;<br &sol;><img class&equals;"alignnone size-full wp-image-563" src&equals;"http&colon;&sol;&sol;techzilica&period;com&sol;wp-content&sol;uploads&sol;2022&sol;06&sol;Encapsulation&period;png" alt&equals;"PDU encapsulation on networks" width&equals;"375" height&equals;"194" &sol;><&sol;p><p> <&sol;p><p>A VPN is a protocol which your computer can use to encapsulate all internet traffic in an encrypted stream to be decrypted at another location &lpar;essentially setting up a tunnel from one location to another with encryption&rpar; before being sent to the intended internet location&period;<&sol;p><p>When you connect to a Wi-Fi network&comma; your computer is told information on where to go &lpar;the DNS server via DHCP&rpar; to convert website addresses &lpar;like google&period;com&rpar; to IP addresses&period; Your computer will accept the data the Wi-Fi network provides on how to look-up domains unless it is set manually and is assumed to be correct&period;<&sol;p><p>A VPN is considered more secure&comma; as all data is encrypted before being sent over the Wi-Fi network&period; This way if an issue could be exploited in an encrypted protocol the computer uses to communicate&comma; the data could not be read by the malicious Wi-Fi network operator as it is encapsulated&sol;encrypted again by the VPN&period;<&sol;p><p>Network security has significantly improved in the last 5 years&period; Once&comma; most protocols on the internet did not employ encryption&comma; allowing anybody to eavesdrop on your computer communicating with low levels of sophistication and setup&period;<&sol;p><p>Now&comma; modern and well-developed applications employ encrypted protocols to provide privacy&period;<&sol;p>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-229b7a4 elementor-widget elementor-widget-heading" data-id&equals;"229b7a4" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Risks &amp&semi; Solutions<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-778e1b3 elementor-widget elementor-widget-text-editor" data-id&equals;"778e1b3" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<p><strong><span style&equals;"text-decoration&colon; underline&semi;">Eavesdropping by malicious Wi-Fi network operators – VPN mitigation<&sol;span><br &sol;><&sol;strong>A VPN is recommended by official government advice when using public Wi-Fi&comma; with a VPN internet traffic is encapsulated and encrypted strongly using one protocol which reduces the attack surface of your communications when connecting to public Wi-Fi&semi; as without a VPN&comma; there are many protocols your computer uses to communicate on the internet which allows more chance for poorly implemented protocols and unknown vulnerabilities in the protocols to cause security breaches&period;<&sol;p><p>The likelihood the type of attack a VPN mitigates is low as it requires high levels of sophistication&period;<&sol;p><p><span style&equals;"text-decoration&colon; underline&semi;"><strong>DNS poisoning – Enable DNSSEC mitigation<&sol;strong><&sol;span><br &sol;>DNS is arguably the weakest area when it comes to users accessing public Wi-Fi as it allows for malicious Wi-Fi network operators to redirect internet traffic to domains and preform man-in-the-middle attacks&period;<&sol;p><p>Manually setting the DNS server the computers look to for DNS and employing DNSSEC is the best solution&period;<&sol;p><p>Exploiting DNS is a fundamental part of many public Wi-Fi security breaches due to DNS being old and security focused by default&period;<&sol;p><p><span style&equals;"text-decoration&colon; underline&semi;"><strong>Public Wi-Fi – 4G&sol;5G mobile data mitigation<&sol;strong><&sol;span><br &sol;>Government advice suggests using mobile data as an alternative to public Wi-Fi as this mitigates the risk of public Wi-Fi entirely&period;<&sol;p>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-b361e69 elementor-widget elementor-widget-heading" data-id&equals;"b361e69" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"heading&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<h2 class&equals;"elementor-heading-title elementor-size-default">Summary<&sol;h2>&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-element elementor-element-0a38501 elementor-widget elementor-widget-text-editor" data-id&equals;"0a38501" data-element&lowbar;type&equals;"widget" data-widget&lowbar;type&equals;"text-editor&period;default">&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"elementor-widget-container">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<p>The risk of using public Wi-Fi is lower than years past as networks have become more secure&comma; risks do remain&comma; and it is impossible to eliminate risk entirely with networks&period;<&sol;p><p>There are options available to mitigate different levels of risk which should be applied based off the risk tolerance of the organisation&sol;user&period;<&sol;p>&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;section>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;

Exit mobile version