Preview

Wireless Security

Powerful Essays
Open Document
Open Document
3481 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireless Security
SECURITY OF WIRELESS COMMUNICATIONS
Introduction
Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.

Purpose of the Study
The purpose of the study was to assist in the decision whether Lotus Development should extend current security policies to encompass wireless devices. The following are critical security questions:
· What challenges are faced with wireless security?
· How can you verify that the device being used is actually in the hands of an authorized user? How can you enhance the security of the device?
· How secure is the over-the-air network between the organization and the wireless device?
· How can you secure the wireless session?
· Should Lotus development include wireless devices in their security policies?
Research Methods and Procedures
Through traditional and electronic research of books, periodicals, and business journals, secondary research was conducted. Figures were constructed through extensive research and study of interactions of networks.

Wireless Security Challenges Mobile devices and wireless networks rely on a broad spectrum of technology, much of it cutting-edge. In comparison to PCs, each class of mobile device currently represents a unique hardware and software platform. Mobile phones and PDAs, for example, have varying capabilities and limitations both as computing devices and as client devices accessing corporate networks. The wireless networks that support mobile devices are similarly diverse.

By relying on industry standard



References: Saarinen, Markku-Juhani Attacks Against The WAP WTLS Protocol. University of Jyväskylä, 1999.

You May Also Find These Documents Helpful

  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Effective data encryption comes standard on your home network wireless router and information transmitted cannot be read without the correct encryption key. Password protection can be enabled on all devices and users should choose strong passwords of adequate length. Thefts of wireless devices are on the rise. Users can learn ways protect themselves and the device from crime, and make a loss or theft known the employer or carrier for fast action.…

    • 864 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Wireless connections open our network to potential threats. We should do everything possible to limit the number of allowed wireless devices on our network. I suggest that we enforce a policy of a primary and secondary wireless network. This would allow us to give our employees the functions they need while maintaining a secure network. Our primary network will be secured with Wi-Fi Protected Access version 2 (WPA2) and the user of a complex passphrase to prevent brute force attacks. This section of our network will have a limited number of users allowed,…

    • 904 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    First, we present an evil twin detection strategy called context-leashing based upon recording the nearby access points when first associating with an access point. Using this contextual information, the client determines if an adversary has setup an evil twin access point at a different location. Next, we propose an SSH-style authentication method called EAP-SWAT to perform one-way access point authentication that fits into the extensible authentication protocol (EAP) framework. I. I NTRODUCTION…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Benefits of an iPad Mini

    • 964 Words
    • 4 Pages

    * Device policies, restrictions and strong encryption methods in iOS provide a layered approach to protecting proprietary, business-critical information.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The Byod Security Risk

    • 1158 Words
    • 5 Pages

    The introduction of mobile devices in the workplace has been on the rise and there is no denying that these devices are transforming how companies do business. This has introduced the BYOD or Bring Your Own Device model in the workplace and its becoming more popular every day. BYOD is a policy that accepts employees bringing personally owned mobile devices to their workplace and using them to access company data such as email, file servers and databases as well as their personal applications and data. But as data transmissions increase with these devices so does the chances of them being hacked and the burden of successfully managing the mobile devices is laid upon the IT departments. One of the real underlying issue with BYOD and mobile security is the that people in IT, compliance and internal audit aren't willing to stick their necks out and try to enforce their mobile security policies or enforce an effective Enterprise Mobility Management solution.…

    • 1158 Words
    • 5 Pages
    Good Essays
  • Better Essays

    There are various security threats for the various mobile devices that we all use on a daily basis. Smartphones are outselling PCs and the lack of adequate security for these devices and other mobile devices leave them vulnerable targets for hackers and other cyber criminals. As the number of attacks increase, the strategies, mitigating solutions and other countermeasures are not keeping up to prevent these attacks. This case study will examine and explore mobile device security and other threats related to computer security.…

    • 1136 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    By the end of 2013, there will be more mobile devices on Earth than people, a new report suggests. According to Cisco 's Visual Networking Index Global Mobile Data Traffic Forecast Update, consumers ' mobile appetite has grown a lot in the past year, and it shows no signs of slowing. In fact, Cisco predicts global mobile data traffic will increase 13-fold by 2017, with more than 10 billion mobile-connected devices by then (Murphy, 2013). Users of mobile devices have become dependent upon this technology not only for personal communications, but to conduct business transactions. This increase in commerce activity has had a corresponding increase in illegal activities geared toward taking advantages of mobile insecurities to steal consumer’s money and credentials.…

    • 2094 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    References: Rowan, T (2010), Negotiating WiFi security, Network Security, Vol. 2010, Issue 2, pp. 8–12.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    3g vs. 4g

    • 1614 Words
    • 7 Pages

    We rely on our cell phones, mobile computers and tablets more and more each day. We are always on the go and we like having the world at our fingertips. The next generation wireless network, as dictated by the standards, creates the opportunity to offer high-speed data services, to build simplified network architecture, and to reduce different operations. Today we can have information access from anywhere all the time even in a state of mobility. Buzzwords such as mobile, ubiquitous, nomadic, untethered, pervasive, and any time anywhere, are used by different people to refer to the new breed of computing that utilizes small portable devices and wireless communication networks. (Alrefai, AbuAli, & Mohammad, 2011)…

    • 1614 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    design for home use. The target market is composed of lowincome individuals who cannot afford the services of a…

    • 3883 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Panko and Panko Business Data Networks and Telecommunications, 8th Edition 1 Chapters 1–4: Introductory material Chapters 5–6: Switched networks Chapter 7: 802.11 standards and operation Chapter 8: 802.11 security, 802.11 management, other local wireless technologies, and cellular technologies Chapter 8 Chapters 9–10: Internetworking Panko and Panko Business Data Networks and Telecommunications, 8th Edition © 2011…

    • 2613 Words
    • 11 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Humanity is now seeing a greater demand in wireless data services through mobile phone carriers that are able to provide internet access within their networks which pushes this wave even further. In the United States, it is not uncommon for people to have 2-3 devices that access the internet. People are now able to access the internet at broadband speeds away from their home, office, or hotspot through their wireless carriers EVDO or EDGE supported cell towers. These speeds, along with mobility, allow people to do everything they are able to do on their home or work connection while they are out. PDA and Blackberry devices are paving the way to give an excellent high speed mobile experience offering slimmed down yet feature rich versions of our favorite operating systems.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    One of the advancements in information technology is wireless mobile communication . The most attractive feature of this technology is “anytime-to-anyplace” communication possible, and is now widely applied in the corporate world. This technology system allows increased mobility and extended services to remote areas.…

    • 394 Words
    • 2 Pages
    Satisfactory Essays