Denial-of-service attacks

Have you ever feel that a webpage is loading too slow compared to other times, a poor network performance while trying to retrieve s file from a cloud server, an increasing amount of time in order to reach an specific service from the internet? It’s obvious that there are many factors that can influence the weak performance from the network, but it is important to take into account that it could be a denial-of-service attack. It’s not that easy to spot the problem, but first, what is a denial-of-service attack?

We can define a a DoS attack as a planned attack to a server in order to disrupt an organization’s network to complicate the entry of their user to their services. The attack can limit the access to the network or even to deny the access. The main point is to prevent any online activity through the servers that are being attacked.

There is also a Distributed Denial-of-Service attack, where the attacker also infects the computers that get connected to the infected servers and now these new computers are used to infect more users. These new infected computers are known as zombies. Zombies are the computers that are controlled by the attacker. With the control of all of the computers, the attacker can use their power to overload the services, such as mail, internet, and network services.

Also, there are three specific categories in which the hackers focus their attacks:

  • Networks
  • Systems
  • Applications

Distributed-Denial-of-Service-Attack-Greets-Forked-Bitcoin-Gold-on-First-Day.jpg

Mainly, all of them create requests to overload the servers until there is no response or until they create an error on the system. One of the main goals is to consume as much bandwidth as possible in order to create slowdowns in networks. Hackers also focus on hardware, such as routers and devices that need network to function, such as a wireless printer.

Just as the video mentioned before, it is important to check for security updates in all of our devices. Also, we can check constantly if our machines are infected with any kind of malware. Updates are esencial for security, most of the time they contain security patches. Remember, stay updated.

References

What is a Denial of Service (DoS) Attack? – Definition, Types & Examples – Video & Lesson Transcript | Study.com. (2018). Retrieved from https://study.com/academy/lesson/what-is-a-denial-of-service-dos-attack-definition-types-examples.html

Redes domésticas

Es muy útil saber cómo modificar los ajustes de un módem. Cambiarle la contraseña a la red de la casa o incluso cambiarle el nombre puede llegar a ser muy sencillo y puede a llegar a incrementar un poco la seguridad de la red. Sin embargo, hay más opciones en los ajustes de un módem y éstas pueden llegar a ser implementadas de una manera muy sencilla. Una de las ventajas de acceder a los ajustes de éste es que puedes crear redes locales dentro de la casa o la oficia. La división de la red puede llegar a ser útil para conectar ciertos dispositivos a una de ellas y los otros a la otra, se puede crear una red para invitados, o incluso redes privadas para intentar mantener más segura cierta información que se comparte cuando alguien se encuentra en la misma red. A continuación, se mostrará un pequeño tutorial para crear una nueva red doméstica.

1 – Entrar a la página web del módem

Normalmente, para poder acceder a la configuración del router se tiene que ingresar a la dirección 192.168.X.X. En este caso para ingresar a la configuración del módem de Telmex, se ingresa a 192.168.1.254. El usuario puede variar (TELMEX en este caso) y la contraseña es la clave que viene en el modem.

1.png

2 – Ir a Red

Al entrar a la configuración del módem, una ventana parecida aparecerá en la pantalla. Hay que seleccionar la opción de “Red” que se encuentra en la columna izquierda.

2.png

3 – Inalámbrico (2.4GHz o 5GHz)

Una vez adentro de la opción de Red, se selecciona el tipo de red inalámbrica que se desea crear el la columna izquierda. En este caso, se seleccionará la red 5GHz.

3.png

4 – Seleccionar SSID

En este módem, se permiten hasta 8 redes, 4 por parte de la red 2.4GHz y 4 de la 5GHz. Primero, se cambia de red en “Selección SSID” por la SSID6 en adelante, si es que no se quiere modificar la red 5GHz principal.

4.png

5 – Cambiar de nombre y habilitar

Del mismo modo, se modifica “Nombre SSID” y se habilita la opción “Habilitar SSID” a “Habilitación” para que pueda ser visible a los dispositivos. En este caso, el nombre que se le asignó a la nueva red fue “Seguridad_1”.

5.png

6 – Asignar cifrado y contraseña

Finalmente, se selecciona un cifrado y se asigna una contraseña a la nueva red. Hay 4 opciones en modo cifrado.

6.png

 

Se pueden agregar más restricciones en caso de ser necesarias, tales como el número máximo de usuarios o habilitar WPS. Para finalizar, se guardan los cambios y se espera a que la nueva red aparezca en las opciones de redes. En caso de querer removerla, se vuelve a seleccionar la SSID y en la sección de “Habilitar SSID” se selecciona la opción “Deshabitar”.

Wireless security

Wireless networks

Since the last few years, wireless networks have become very important in the market. We can see wireless networks everywhere, such as in the coffee shops, some malls, on the streets, airports, hotels,  home, school, etc. The problem is that there are a lot of security problems with them. It is important to take into consideration that nowadays, wireless networks carry important information and it is crucial to have a secured wireless network.

Although it is easier to get connected to a wireless network rather than a wired one, it has become more vulnerable because of the facility to get connected to a wireless one. Each day, people are being connected to the internet and its easier to be in risk because of that. But leaving aside those risks, wireless networks have a lot of advantages. Before the explanation of them, i’ll recommend you to watch the next video regarding wireless security:

 

Wireless Security protocols

In order to protect wireless networks, WSP (wireless security protocols) were invented. These WSP are mainly targeted to protect local networks, such as the ones that are in home or offices. These WSP have their own strengths and weaknesses, but they offer wireless security in most of the cases, sending encrypted data through the airwaves.

The problem with the wireless networks is that the information is send to every device that is listening to the signals, obviously, it has a limited range. One of the benefits of the wired networks is that it has only one connection, between device A to device B. Protocols were created to protect these airwaves signals. We have three protocols: WEP, WPA, and WPA2.

WEP (Wired Equivalent Privacy)

The WEP was the first protocol to secure the wireless networks. The main point of the protocol is to give the same protection to the wireless one as if it was a wired one. It is well-known that this protocol is easy to broke and very difficult to configure.

WPA (Wifi Protected Access)

The Wifi Protected Access was implemented when the 802.11i wireless security standard was in its development (the one that is explained in the video). This protocol uses a Personal Key and a Temporal Key and both of them are used for encryption. There is a WPA Enterprise that uses an authentication server to give keys and certificates.

WPA2 (Wi-Fi Protected Access version 2)

The WPA2 has different methods of encryption compared to the WPA.WPA2 uses Advanced Encryption Standard (AES) for encryption. This Standard has a certification from the US government and, until today, it’s used to protect the wireless information and is classified as an active and useful protocol.

References

Wireless Security. (2018). YouTube. Retrieved from https://www.youtube.com/watch?v=SOvO3aYp0uw

Wireless Security Protocols: WEP, WPA, and WPA2 – dummies. (2018). dummies. Retrieved from http://www.dummies.com/computers/computer-networking/wireless/wireless-security-protocols-wep-wpa-and-wpa2/