Preview

Wireless Security

Powerful Essays
Open Document
Open Document
3481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security
SECURITY OF WIRELESS COMMUNICATIONS
Introduction
Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.

Purpose of the Study
The purpose of the study was to assist in the decision whether Lotus Development should extend current security policies to encompass wireless devices. The following are critical security questions:
· What challenges are faced with wireless security?
· How can you verify that the device being used is actually in the hands of an authorized user? How can you enhance the security of the device?
· How secure is the over-the-air network between the organization and the wireless device?
· How can you secure the wireless session?
· Should Lotus development include wireless devices in their security policies?
Research Methods and Procedures
Through traditional and electronic research of books, periodicals, and business journals, secondary research was conducted. Figures were constructed through extensive research and study of interactions of networks.

Wireless Security Challenges Mobile devices and wireless networks rely on a broad spectrum of technology, much of it cutting-edge. In comparison to PCs, each class of mobile device currently represents a unique hardware and software platform. Mobile phones and PDAs, for example, have varying capabilities and limitations both as computing devices and as client devices accessing corporate networks. The wireless networks that support mobile devices are similarly diverse.

By relying on industry standard



References: Saarinen, Markku-Juhani Attacks Against The WAP WTLS Protocol. University of Jyväskylä, 1999.

You May Also Find These Documents Helpful

  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The internet has pervaded every aspect of business and Kudler Fine Foods has used it as a tool to further their goals. Wireless technology should be the next stepping stone for Kudler to use to advance in their field, and much like most new technologies the use of wirelessly connected devices can pose a number of security concerns. The benefits of having connectivity throughout the enterprise can outweigh the security concerns that wireless technology can pose. There are certain steps that can be taken to mitigate most of the concerns of having wirelessly connected devices on the network and these steps will be touched upon along with some of the major threats.…

    • 1352 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Week 8 It-242

    • 685 Words
    • 3 Pages

    For a while in the past, we refer the wireless technology as cellular phones. But now, the term "wireless" refers to more varied devices & technologies, like smartphones, computers, printers, headphones and even speakers that connects together in different ways. Today’s wireless phones for example, may include data packets like 3G & 4G cellular radio signals, Wi-Fi and even Bluetooth technologies, these technologies have advance in a fast pace that investing in equipment like 4G phone and/or 802.11x wireless routers can offer you & your business a variety of speed improvements for your money. Now I shall describe the characteristics of every type of wireless signal types so we can learn to use every signal type.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Network Design APA Paper

    • 1898 Words
    • 9 Pages

    I will also implement a wireless media utilizing the 802.11g/n standards. However, unlike physical media, wireless media is susceptible to security…

    • 1898 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Wireless connections open our network to potential threats. We should do everything possible to limit the number of allowed wireless devices on our network. I suggest that we enforce a policy of a primary and secondary wireless network. This would allow us to give our employees the functions they need while maintaining a secure network. Our primary network will be secured with Wi-Fi Protected Access version 2 (WPA2) and the user of a complex passphrase to prevent brute force attacks. This section of our network will have a limited number of users allowed,…

    • 904 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Benefits of an iPad Mini

    • 964 Words
    • 4 Pages

    * Device policies, restrictions and strong encryption methods in iOS provide a layered approach to protecting proprietary, business-critical information.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Byod Security Risk

    • 1158 Words
    • 5 Pages

    The introduction of mobile devices in the workplace has been on the rise and there is no denying that these devices are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming more popular every day. BYOD is a policy that accepts employees bringing personally owned mobile devices to their workplace and using them to access company data such as email, file servers and databases as well as their personal applications and data. But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the mobile devices is laid upon the IT departments. One of the real underlying issue with BYOD and mobile security is the that people in IT, compliance and internal audit aren't willing to stick their necks out and try to enforce their mobile security policies or enforce an effective Enterprise Mobility Management solution.…

    • 1158 Words
    • 5 Pages
    Good Essays
  • Better Essays

    There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    By the end of 2013, there will be more mobile devices on Earth than people, a new report suggests. According to Cisco 's Visual Networking Index Global Mobile Data Traffic Forecast Update, consumers ' mobile appetite has grown a lot in the past year, and it shows no signs of slowing. In fact, Cisco predicts global mobile data traffic will increase 13-fold by 2017, with more than 10 billion mobile-connected devices by then (Murphy, 2013). Users of mobile devices have become dependent upon this technology not only for personal communications, but to conduct business transactions. This increase in commerce activity has had a corresponding increase in illegal activities geared toward taking advantages of mobile insecurities to steal consumer’s money and credentials.…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    According to a recent study, 42% of wireless 802.11 access points (APs) provide no security mechanisms — not even WEP or WPA [1]. Often times, wireless APs are left open for convenience. For example, a coffee shop or bookstore may wish to offer a free wireless service, so there is no need to authenticate its wireless users. However, wireless clients that use these APs are vulnerable to a number of trivial threats such as eavesdropping and injection attacks. An additional and often over-looked vulnerability caused by using open APs is the access point impersonation attack.…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    design for home use. The target market is composed of lowincome individuals who cannot afford the services of a…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Humanity is now seeing a greater demand in wireless data services through mobile phone carriers that are able to provide internet access within their networks which pushes this wave even further. In the United States, it is not uncommon for people to have 2-3 devices that access the internet. People are now able to access the internet at broadband speeds away from their home, office, or hotspot through their wireless carriers EVDO or EDGE supported cell towers. These speeds, along with mobility, allow people to do everything they are able to do on their home or work connection while they are out. PDA and Blackberry devices are paving the way to give an excellent high speed mobile experience offering slimmed down yet feature rich versions of our favorite operating systems.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays