• Keine Ergebnisse gefunden

19_Worksheet Report Findings

N/A
N/A
Protected

Academic year: 2022

Aktie "19_Worksheet Report Findings"

Copied!
3
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Das diesem Dokument zugrundeliegende Vorhaben wurde mit Mitteln des Bundesministeriums für Bildung und Forschung

unter dem Förderkennzeichen 16OH21005 gefördert.

Die Verantwortung für den Inhalt dieser Veröffentlichung liegt

beim Autor/bei der Autorin.

(2)

1/2 WORKSHEET REPORT FINDINGS

1. What are the functions of these parts of a report?

Write down the definition or an example.

2. Your manager is asking you to write a report called “The security of the Wi-Fi hotspots”.

A. Read the article below and highlight the most important information. Which parts of the text can you use for the findings? Sum up the key findings in your own words: paraphrase the ideas, use reported speech instead of quotes and summarise the data to make your text reader-friendly.

Write here…

B. Are there any parts that you can also use for the introduction and the executive summary?

Can you simply use the ideas from the text or do you need to add some information?

Write here…

One in four Wi-Fi hotspots vulnerable to attack, study finds

Warwick Ashford, www.computerweekly.com At least one in four Wi-Fi hotspots are open to attack, a study by Kaspersky Lab reveals

More than a quarter of Wi-Fi hotspots worldwide are not secured and pose a risk to users’

personal data, according to Kaspersky Lab.

The finding is based on the analysis of information on more than 31 million Wi-Fi hotspots around the world, which showed that traffic over 28% could be intercepted easily by hackers.

According to analysis by the cloud-based Kaspersky Security Network, 25% of Wi-Fi networks have no encryption or password protection of any kind.

This means the data passing through them is completely open and can be read by third parties. Another 3% of hotspots use WEP (Wired Equivalent Privacy) to encrypt data, which is an unreliable protocol that can be “cracked” in minutes using tools that are freely available on the internet.

The rest of the nearly three-quarters of Wi-Fi hotspots use a more reliable form of encryption based on the family of Wi-Fi Protected Access (WPA) protocols.

The effort required to hack these networks depends on the settings, including the strength of the password. For example, if it is a weak or publicly accessible password, a criminal will also be able to decrypt any traffic that is transmitted.

Introduction Executive summary Findings

(3)

2/2 Security experts say all Wi-Fi connections should use strong encryption, such as the WPA2 encryption standard. Without strong encryption, there is a threat that if an attacker gains access to a wireless network, they can cause a lot of damage.

If attackers can intercept usernames/passwords, they could take control of computers on the Wi-Fi network, change browsing to websites that deliver malware or capture credentials, or use the Wi-Fi network to perform various anonymous or illegal activities.

Kaspersky Lab said the top 20 countries with the highest percentage of non-encrypted Wi-Fi hotspots includes many popular tourist destinations such as Thailand, France, Israel and the US.

Another study by the security firm shows that only 57% of internet users are concerned about their data being intercepted during a Wi-Fi session.

“We advise all users to remain vigilant when connecting to Wi-Fi,” said Denis Legezo, antivirus expert at Kaspersky Lab.

“Don’t use hotspots without passwords and don’t use public hotspots to perform high-risk activities such as online banking or shopping, logging on to sites or for transferring

confidential information,” he said.

Legezo warned that if transactional traffic is intercepted by a third party, it could result in serious financial and other losses.

“We strongly recommend using additional measures to protect traffic, such as VPN [Virtual Private Network] technology,” he said.

In 2014, Europol issued a warning about sending sensitive information over public Wi-Fi hotspots.

The warning was issued in the light of a growing number of cyber attacks using personal information stolen through public Wi-Fi hotspots, Europol said.

Europol also highlighted the risk of rogue Wi-Fi hotspots to dupe victims into mistaking them for official public Wi-Fi hotspots and connecting to them.

This means attackers are able to monitor all communications through the rogue Wi-Fi access points and steal data exchanged with banks, retailers and other online service providers.

Kaspersky Lab recommends that to reduce the risk of attack when using public Wi-Fi, all users should:

Use only trusted and secure Wi-Fi networks when doing anything confidential that involves typing a username and password, or transmitting confidential data.

Use a VPN whenever possible.

Make sure, before signing in to any web site, that it is secure by looking for ‘https’ in the URL and the unbroken padlock symbol, as well as checking the security certificate.

Secure the computer used to access public Wi-Fi with a reputable internet security product.

Protect all devices, including laptops, tablets and smartphones.

See the original here: http://www.computerweekly.com/news/450403539/One-in-four-Wi- Fi-hotspots-vulnerable-to-attack-study-finds

Referenzen

ÄHNLICHE DOKUMENTE

Se concluye que la familia es un elemento central en el discurso de todos; en los miembros del estrato medio, la estructura de la familia nuclear se reconoce como indispensable

Über einen einfach einzurichtenden Account können Sie die Wetterstation an verschiedene Internet- Wetterportale anmelden, sodass die Wetterdaten via WLAN über Ihren Router auf

Einige Funktionen dieses Gerätes können über die Fernbedienung des Fernsehers aufgerufen werden, wenn dieses Gerät über einen HDMI-Anschluss an ein LG Fernsehgerät

While several points of criticism were raised during the workshop discussions (see section below), the fi- nal research papers submitted by students showed that the

free-key  IT-Innerebner GmbH  Bundesstraße 27  A-6063 Innsbruck / Neu-Rum T: +43 (0)512 / 39 06 05  F: +43 (0)512 39 06 58  info@free-key.eu 

Sollten Sie einen HDMI-, optischen, ARC-, Optical Sound Sync- oder USB-Eingang verwenden, müssen Sie die Taste verwenden, um Google Assistant zu aktivieren..

Hinweis: Im Feld "WPS Instance ID" (WPS-Instanz-ID) können Sie die Instanz von WPS auswählen, für die das Gerät registriert werden soll.. Der WAP unterstützt jedoch nur

With this paper, we propose to use the signal measurements directly to infer the trajectory in comparison with a database of trajectories removing the need for accurate map