Compaq Armada 110s Wireless Security - Page 5
Device Security - notebook
View all Compaq Armada 110s manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 5 highlights
Wireless Security White Paper 5 - (This aspect of security is not covered in this paper, since securing data from unauthorized access behind the firewall is not a wireless security concern, but a wired one.) Figure 1 illustrates the pipe. Figure 1: The Network Pipe The vertical yellow lines in Figure 1 represent the pivotal points of data transfer. The horizontal lines represent data traveling from one place to the next either wired or wirelessly. The entire pipe must be considered in planning security models. Each element of the pipe, along with the security problems and solutions associated with it, is discussed in the next five subsections. Device Security Despite the growing popularity of handheld PCs, PDAs, and cellular telephones, the truly ubiquitous mobile computing device in the United States is still the notebook computer (in Europe it is the mobile telephone). Notebook computers are used for online connectivity, Internet surfing, organization of information such as contact lists and tasks, storage of vast amounts of data, hosting of numerous client applications, and creation of primary content such as documents, e-mail messages, and spreadsheets.