{"id":73,"date":"2021-12-22T10:54:40","date_gmt":"2021-12-22T15:54:40","guid":{"rendered":"https:\/\/opentextbc.ca\/comptech\/chapter\/wi-fi-networks\/"},"modified":"2022-10-05T13:50:14","modified_gmt":"2022-10-05T17:50:14","slug":"wi-fi-networks","status":"publish","type":"chapter","link":"https:\/\/opentextbc.ca\/comptech\/chapter\/wi-fi-networks\/","title":{"raw":"Wi-Fi Networks","rendered":"Wi-Fi Networks"},"content":{"raw":"<h1>Encryption<\/h1>\nEncryption is the process of hiding the contents of information, which is particularly important as you send and receive information (e.g. passwords, credit card information, other personal information, etc.) on your computing devices.\n\nEncryption strength is measured in bits (e.g. 64 bit, 128 bit, 256 bit, 512 bit, etc.) The larger the number, the stronger the encryption. Currently 256 bit encryption is considered strong (i.e. difficult to decrypt without a key).\n\nAs an example, \u201cdpnqvufs\u201d is a simple form of encrypting the word \u201ccomputer\u201d by shifting each letter to the next one in the alphabet (i.e. \u201cc\u201d becomes \u201cd\u201d, \u201co\u201d becomes \u201cp\u201d, etc.).\n\nThe diagram below shifts each letter 3 to the right (i.e. \u201ca\u201d becomes \u201cd\u201d. \u201cB\u201d becomes \u201ce\u201d, etc.) and encrypts \u201chello\u201d as \u201ckhoor\u201d.\n\n[caption id=\"attachment_72\" align=\"aligncenter\" width=\"429\"]<img class=\"wp-image-70 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image12.png\" alt=\"Picture shows how letters could be substituted to &quot;encrypt&quot; a message with a simple offset method.\" width=\"429\" height=\"100\"> Figure 13.1 Sample encryption algorithm[\/caption]\n\nIn the above two examples, the encryption would be considered very weak, as it could be decrypted extremely easily by a computer program.\n\n[caption id=\"attachment_72\" align=\"aligncenter\" width=\"300\"]<img class=\"wp-image-71\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3.png\" alt=\"Image of a browser screen emphasizing the URL with the https prefix, indicating additional security attributes\" width=\"300\" height=\"240\"> Figure 13.2 Https Website with Security[\/caption]\n\nWhen you are using a web browser on the Internet, ideally you only deal with encrypted web sites (so that someone intercepting the communications between you and the website can\u2019t easily decipher these communications).\n\nHow do you tell if the website uses encryption? Look at the address bar in the web browser, it\u2019s where the web site address appears, e.g. <a href=\"http:\/\/www.capilanou.ca\">www.capilanou.ca<\/a> If the site uses encrypted communication, you will either see \u201chttps:\/\/\u201d before the website address and\/or see the image of a locked padlock. If the site is unencrypted you will see either \u201chttp:\/\/\u201d before the website address and\/or see the image of an unlocked padlock. E-Commerce sites (banks, retailers, etc.) have typically always used encryption to protect financial transactions; however, there is a trend to having all websites use encryption.\n\nIn addition to encrypting Internet communications, some people choose to encrypt the personal data stored on their devices. This is desirable for employees working with sensitive company information should their device ever be stolen; however, encryption can also be used by criminals and terrorists to mask their activities. As such, there is a debate in many governments around the world as to whether encryption should be allowed for use by private citizens, and whether \u201cbackdoors\u201d (i.e. a way in) should be mandated to assist law enforcement.\n\nWhen traveling, be aware that different countries have different laws &amp; regulations with respect to the ability of government border agents to demand decryption keys to encrypted information (as well as passwords to social media accounts) on electronic devices that people are bringing as they cross a border.\n<h1>Public Access Points<\/h1>\n[caption id=\"attachment_72\" align=\"aligncenter\" width=\"400\"]<img class=\"wp-image-72\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4.png\" alt=\" a Starbucks cafe offering free WiFi. \" width=\"400\" height=\"264\"> Figure 13.3 is free wifi secure?[\/caption]\n\nIf you have ever been in a coffee shop, hotel lobby, or other location where they offer free Wi-Fi, be cognizant of the type of Wi-Fi connection (encrypted or unencrypted) being offered, and adjust the type of activities you are doing on your device accordingly.\n\nUnencrypted Wi-Fi networks don\u2019t require a password to join them. Encrypted networks will have a password.\n\nEncrypted public networks (those with a password) are preferred, as any personal information you reveal while connected would be unreadable by someone intercepting your device\u2019s communications with the coffee shop\u2019s router. Similarly to a web browser, when you display a list of available Wi-Fi networks, you should see a closed padlock beside the networks that are encrypted.\n\nIf you are connected to a Wi-Fi network without encryption, be aware that all communications between your device and the coffee shop\u2019s router could be read by others, typically it\u2019s hackers who would be interested in doing this. If this is the type of connection you have, stick to reading the news and checking weather, and consider not doing anything where you are transmitting personal information (e.g. email, banking, user-IDs, passwords, etc.).\n\nThere have been isolated instances of hackers parking in a hotel parking lot and creating an unencrypted Wi-Fi hotspot using the hotel\u2019s name in the SSID (the name you see for the Wi-Fi network). This makes it appear to any hotel guest that they are connecting to the hotel Wi-Fi, but in fact they are connected to the hacker\u2019s Wi-Fi. The goal is to steal login credentials and other information to enable identity theft. If you ever see two Wi-Fi networks with very similar names and one is encrypted and one is not, always connect to the encrypted Wi-Fi (the one that requires a password).\n<h3>Media Attributions<\/h3>\n<ul>\n \t<li>\"<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Caesar_cipher_Encode_and_Decode.PNG\">Caesar cipher Encode and Decode<\/a>\" by <a class=\"new\" title=\"User:Meilani.conley (page does not exist)\" href=\"https:\/\/commons.wikimedia.org\/w\/index.php?title=User:Meilani.conley&amp;action=edit&amp;redlink=1\">Meilani.conley <\/a>is licensed under a <span class=\"cc-license-identifier\"><a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\">CC BY-SA 4.0 licence<\/a>. <\/span><\/li>\n \t<li>\"<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Internet2.jpg\">Internet2<\/a>\" by Fabio Lanari is licensed under a<span class=\"cc-license-identifier\"><a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\"> CC BY-SA 4.0 licence<\/a>.\n<\/span><\/li>\n \t<li>\u201c<a href=\"https:\/\/www.flickr.com\/photos\/khawkins04\/6170218244\">Free Wi-Fi | Didn't work, but I picked up the free wifi next\u2026 | Flickr<\/a>\u201d by Ken Hawkins is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\"><span class=\"cc-license-identifier\">CC BY 2.0<\/span> licence.<\/a><\/li>\n<\/ul>","rendered":"<h1>Encryption<\/h1>\n<p>Encryption is the process of hiding the contents of information, which is particularly important as you send and receive information (e.g. passwords, credit card information, other personal information, etc.) on your computing devices.<\/p>\n<p>Encryption strength is measured in bits (e.g. 64 bit, 128 bit, 256 bit, 512 bit, etc.) The larger the number, the stronger the encryption. Currently 256 bit encryption is considered strong (i.e. difficult to decrypt without a key).<\/p>\n<p>As an example, \u201cdpnqvufs\u201d is a simple form of encrypting the word \u201ccomputer\u201d by shifting each letter to the next one in the alphabet (i.e. \u201cc\u201d becomes \u201cd\u201d, \u201co\u201d becomes \u201cp\u201d, etc.).<\/p>\n<p>The diagram below shifts each letter 3 to the right (i.e. \u201ca\u201d becomes \u201cd\u201d. \u201cB\u201d becomes \u201ce\u201d, etc.) and encrypts \u201chello\u201d as \u201ckhoor\u201d.<\/p>\n<figure id=\"attachment_72\" aria-describedby=\"caption-attachment-72\" style=\"width: 429px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-70 size-full\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2021\/12\/image12.png\" alt=\"Picture shows how letters could be substituted to &quot;encrypt&quot; a message with a simple offset method.\" width=\"429\" height=\"100\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image12.png 429w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image12-300x70.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image12-65x15.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image12-225x52.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2021\/12\/image12-350x82.png 350w\" sizes=\"auto, (max-width: 429px) 100vw, 429px\" \/><figcaption id=\"caption-attachment-72\" class=\"wp-caption-text\">Figure 13.1 Sample encryption algorithm<\/figcaption><\/figure>\n<p>In the above two examples, the encryption would be considered very weak, as it could be decrypted extremely easily by a computer program.<\/p>\n<figure id=\"attachment_72\" aria-describedby=\"caption-attachment-72\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-71\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3.png\" alt=\"Image of a browser screen emphasizing the URL with the https prefix, indicating additional security attributes\" width=\"300\" height=\"240\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3.png 485w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3-300x240.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3-65x52.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3-225x180.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-3-350x280.png 350w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption id=\"caption-attachment-72\" class=\"wp-caption-text\">Figure 13.2 Https Website with Security<\/figcaption><\/figure>\n<p>When you are using a web browser on the Internet, ideally you only deal with encrypted web sites (so that someone intercepting the communications between you and the website can\u2019t easily decipher these communications).<\/p>\n<p>How do you tell if the website uses encryption? Look at the address bar in the web browser, it\u2019s where the web site address appears, e.g. <a href=\"http:\/\/www.capilanou.ca\">www.capilanou.ca<\/a> If the site uses encrypted communication, you will either see \u201chttps:\/\/\u201d before the website address and\/or see the image of a locked padlock. If the site is unencrypted you will see either \u201chttp:\/\/\u201d before the website address and\/or see the image of an unlocked padlock. E-Commerce sites (banks, retailers, etc.) have typically always used encryption to protect financial transactions; however, there is a trend to having all websites use encryption.<\/p>\n<p>In addition to encrypting Internet communications, some people choose to encrypt the personal data stored on their devices. This is desirable for employees working with sensitive company information should their device ever be stolen; however, encryption can also be used by criminals and terrorists to mask their activities. As such, there is a debate in many governments around the world as to whether encryption should be allowed for use by private citizens, and whether \u201cbackdoors\u201d (i.e. a way in) should be mandated to assist law enforcement.<\/p>\n<p>When traveling, be aware that different countries have different laws &amp; regulations with respect to the ability of government border agents to demand decryption keys to encrypted information (as well as passwords to social media accounts) on electronic devices that people are bringing as they cross a border.<\/p>\n<h1>Public Access Points<\/h1>\n<figure id=\"attachment_72\" aria-describedby=\"caption-attachment-72\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72\" src=\"https:\/\/opentextbc.ca\/technicalwritingh5p\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4.png\" alt=\"a Starbucks cafe offering free WiFi.\" width=\"400\" height=\"264\" srcset=\"https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4.png 599w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4-300x198.png 300w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4-65x43.png 65w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4-225x149.png 225w, https:\/\/opentextbc.ca\/comptech\/wp-content\/uploads\/sites\/415\/2022\/10\/987456321-4-350x231.png 350w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-72\" class=\"wp-caption-text\">Figure 13.3 is free wifi secure?<\/figcaption><\/figure>\n<p>If you have ever been in a coffee shop, hotel lobby, or other location where they offer free Wi-Fi, be cognizant of the type of Wi-Fi connection (encrypted or unencrypted) being offered, and adjust the type of activities you are doing on your device accordingly.<\/p>\n<p>Unencrypted Wi-Fi networks don\u2019t require a password to join them. Encrypted networks will have a password.<\/p>\n<p>Encrypted public networks (those with a password) are preferred, as any personal information you reveal while connected would be unreadable by someone intercepting your device\u2019s communications with the coffee shop\u2019s router. Similarly to a web browser, when you display a list of available Wi-Fi networks, you should see a closed padlock beside the networks that are encrypted.<\/p>\n<p>If you are connected to a Wi-Fi network without encryption, be aware that all communications between your device and the coffee shop\u2019s router could be read by others, typically it\u2019s hackers who would be interested in doing this. If this is the type of connection you have, stick to reading the news and checking weather, and consider not doing anything where you are transmitting personal information (e.g. email, banking, user-IDs, passwords, etc.).<\/p>\n<p>There have been isolated instances of hackers parking in a hotel parking lot and creating an unencrypted Wi-Fi hotspot using the hotel\u2019s name in the SSID (the name you see for the Wi-Fi network). This makes it appear to any hotel guest that they are connecting to the hotel Wi-Fi, but in fact they are connected to the hacker\u2019s Wi-Fi. The goal is to steal login credentials and other information to enable identity theft. If you ever see two Wi-Fi networks with very similar names and one is encrypted and one is not, always connect to the encrypted Wi-Fi (the one that requires a password).<\/p>\n<h3>Media Attributions<\/h3>\n<ul>\n<li>&#8220;<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Caesar_cipher_Encode_and_Decode.PNG\">Caesar cipher Encode and Decode<\/a>&#8221; by <a class=\"new\" title=\"User:Meilani.conley (page does not exist)\" href=\"https:\/\/commons.wikimedia.org\/w\/index.php?title=User:Meilani.conley&amp;action=edit&amp;redlink=1\">Meilani.conley <\/a>is licensed under a <span class=\"cc-license-identifier\"><a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\">CC BY-SA 4.0 licence<\/a>. <\/span><\/li>\n<li>&#8220;<a class=\"internal\" href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Internet2.jpg\">Internet2<\/a>&#8221; by Fabio Lanari is licensed under a<span class=\"cc-license-identifier\"><a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/deed.en\"> CC BY-SA 4.0 licence<\/a>.<br \/>\n<\/span><\/li>\n<li>\u201c<a href=\"https:\/\/www.flickr.com\/photos\/khawkins04\/6170218244\">Free Wi-Fi | Didn&#8217;t work, but I picked up the free wifi next\u2026 | Flickr<\/a>\u201d by Ken Hawkins is licensed under a <a class=\"internal\" href=\"https:\/\/creativecommons.org\/licenses\/by\/2.0\/\"><span class=\"cc-license-identifier\">CC BY 2.0<\/span> licence.<\/a><\/li>\n<\/ul>\n","protected":false},"author":123,"menu_order":13,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-73","chapter","type-chapter","status-publish","hentry"],"part":18,"_links":{"self":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/users\/123"}],"version-history":[{"count":1,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/73\/revisions"}],"predecessor-version":[{"id":74,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/73\/revisions\/74"}],"part":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/parts\/18"}],"metadata":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapters\/73\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/media?parent=73"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/pressbooks\/v2\/chapter-type?post=73"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/contributor?post=73"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/opentextbc.ca\/comptech\/wp-json\/wp\/v2\/license?post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}