Compaq Evo n800c Wireless Security

Compaq Evo n800c - Notebook PC Manual

Compaq Evo n800c manual content summary:

  • Compaq Evo n800c | Wireless Security - Page 1
    Paper December 2001 Prepared by: Access Business Group Compaq Computer Corporation Contents Introduction 3 Security in General 3 a competitive edge. Market researcher Cahners In-Stat estimates that 6.2 million wireless devices will be shipped worldwide this year (2001), and double that in
  • Compaq Evo n800c | Wireless Security - Page 2
    Compaq, the Compaq logo, Deskpro, and Evo are trademarks of Compaq Windows are trademarks of Microsoft Corporation in the U.S. and/or other countries. All other product names mentioned herein may be trademarks of their respective companies. ©2002 Compaq Information Technologies Group, L.P. Wireless
  • Compaq Evo n800c | Wireless Security - Page 3
    of the wireless networks in operation today have no security whatsoever. This is so in part because many users are not aware of specific security For complete wireless and mobile security solutions, please contact Compaq Global Services at http://www.compaq.com/services/index_infrastructure.html.
  • Compaq Evo n800c | Wireless Security - Page 4
    This quality makes electronic transactions legally binding. Non-repudiation is supported by digital signatures and trusted timestamps. • System Management of securing the "pipe", the security issues that may arise with wireless networks at critical junctures along the pipe, and measures that can be
  • Compaq Evo n800c | Wireless Security - Page 5
    wired or wirelessly. The entire pipe must be considered in planning security models. Each element of the pipe, along with the security problems and solutions the United States is still the notebook computer (in Europe it is the mobile telephone). Notebook computers are used for online connectivity,
  • Compaq Evo n800c | Wireless Security - Page 6
    . For information on Compaq notebook computers, see http://www.compaq.com/showroom/notebooks.html. Mobile devices specific to mobile access devices, the first link in the pipe on the client side, and possible solutions to those problems. Usage in Public Mobile devices employing a cellular service
  • Compaq Evo n800c | Wireless Security - Page 7
    Wireless Security White Paper 7 Available Device-specific Smart cards offer a partial solution to the problem of securing data transmissions to and from mobile devices reader reads the smart card in conjunction with a PIN. The enhanced smart card reader also reads the card in conjunction with a PIN
  • Compaq Evo n800c | Wireless Security - Page 8
    Wireless Compaq FIT is currently available only for Compaq Armada and Evo notebook computers. For more information on Compaq FIT, see http://www.compaq.com/products/notebooks/security.html or http://www.compaq While desktop operating systems such as Windows 2000 offer an encrypted file system,
  • Compaq Evo n800c | Wireless Security - Page 9
    code with his or her PIN. RSA Security did not develop a Pocket PC client, but instead incorporated SecurID into the EZOS WAP micro-browser called EzWAP.3 Device-Specific of the small hard drives of handheld devices in conference rooms. Generally, wireless local area networks (WLANs) will facilitate
  • Compaq Evo n800c | Wireless Security - Page 10
    technology are referenced below. The following three subsections comment briefly on the three types of wireless networks and provide an illustration of each type. Wireless Local-area Networks A wireless local-area network (WLAN) is a type of LAN that uses high-frequency radio waves rather than wires
  • Compaq Evo n800c | Wireless Security - Page 11
    Paper 11 Wireless Personal-area Networks Wireless personal-area networks (WPANs) can use Bluetooth, a radio frequency (RF) specification for 3: Wireless Personal-area Network Wireless Wide-area Networks Historically, wireless wide-area networks (WWANs) have been used to support voice transmission
  • Compaq Evo n800c | Wireless Security - Page 12
    Wireless Security White Paper 12 Compaq provides turnkey solutions: clients with enabling technologies, airtime provided by carriers, area network coverage, and optimized features. Compaq WWANs using CDPD and GSM technologies are available now. WWAN via CDPD, for example, provides packet-switched
  • Compaq Evo n800c | Wireless Security - Page 13
    , Inc. and Entrust do not have PKI support for access devices. Smaller companies have point solutions to specific applications that run on the various operating systems. Public Key Infrastructure Most approaches to achieving security for the wireless exchange of information over networks involve the
  • Compaq Evo n800c | Wireless Security - Page 14
    Wireless Security White Paper 14 Core elements of a PKI are: • Asymmetric keys • Digital certificates or derivatives of that algorithm. Figure 6 illustrates symmetric and asymmetric keys. Symmetric Key vs Public Key Symmetric key (shared secret) systems Same key used for encryption and decryption
  • Compaq Evo n800c | Wireless Security - Page 15
    Wireless Security White Paper 15 Digital Certificates Digital certificates are electronic files that can be used as unique identifiers for people and resources over networks. A digital
  • Compaq Evo n800c | Wireless Security - Page 16
    Wireless Security White Paper 16 Digital Signatures Digital signatures are intended to be the legal equivalent of handwritten signatures. The signer generates a "hash value" or "digital
  • Compaq Evo n800c | Wireless Security - Page 17
    commonly used over the Internet for wired networks, can keep a wireless network hidden from prying eyes. Security experts recommend that companies generate and refresh encryption keys for the client and server. • Multiprotocol Support. The VPN must handle common protocols used on the public network.
  • Compaq Evo n800c | Wireless Security - Page 18
    area network (the Internet) into a single large local area enhance the ability of service support in its network routers. VPN software is often never turned on. A further difficulty is that many mobile devices simply do not support VPNs at this time. Additionally, VPNs were not designed with wireless
  • Compaq Evo n800c | Wireless Security - Page 19
    Designed to provide direct, end-to-end connectivity and authentication (mobile client directly to application server) Security Specific to WWAN Carrier Technologies All digitized mobile telephone and wireless packet data networks use some form of encryption. GSM uses a smart card to protect its keys
  • Compaq Evo n800c | Wireless Security - Page 20
    Wireless Security White Paper 20 Code Division to solve problems specific to mobile network devices, including their limited processing power, memory capacity, and WAP 2.0 was released in June 2001 and adds support for Wireless Public Key Infrastructure (WPKI) by describing methods for the
  • Compaq Evo n800c | Wireless Security - Page 21
    of convergence with the IETF and W3C. The WAP gateway is optional and WAP has now adopted the Internet standards TCP, HTTP, and TLS with wireless-specific profiles. Similarly, WML is effectively a profile of XHTML. Much work has been done, as well, on end-to-end security. It may be some time
  • Compaq Evo n800c | Wireless Security - Page 22
    admit traffic only to the machine that is running the Wireless Business Engine (the Wireless Business Engine is the only software listening to the to Transmission Control Protocol -- TCP, and does not provide the service of dividing messages into packets and reassembling them at the receiving end
  • Compaq Evo n800c | Wireless Security - Page 23
    mobile devices. The Wireless Business Engine is designed to support a number of Windows NT domain name is combined with other information and encrypted with the server's public key, which keeps an attacker from impersonating a valid user. Possible Security Problem There may be a significant problem
  • Compaq Evo n800c | Wireless Security - Page 24
    server only supports one connection which transfers data to the local area network via an Ethernet connection in Compaq is an active participant in this effort. In the current draft specification 1x is not limited to wireless networks. It can be LAN without privacy-enhancing encryption techniques.
  • Compaq Evo n800c | Wireless Security - Page 25
    Wireless Security White Paper 25 The fundamental approach used by 802.1x is to authenticate users at the edge of the private network. It would be
  • Compaq Evo n800c | Wireless Security - Page 26
    . EAP already supports multiple authentication schemes is a fundamental problem with key distribution and update. Since WEP keys problem arises when users connect to multiple different wireless LANs (e.g. in public areas or at customer sites). Current WEP implementations require that the user manually
  • Compaq Evo n800c | Wireless Security - Page 27
    their routers. That Specific to WWAN Carrier Technologies." Generally speaking, when data travels along the phone lines to the corporate firewall, the data is secure barring phone line tapping. This is not a unique security problem and will not be discussed in this paper, which is focused on wireless
  • Compaq Evo n800c | Wireless Security - Page 28
    associated with using data servers, desktops with hard drives containing data, and application security are the same for wired and wireless access. Therefore, no attempt is made : Protecting the Enterprise to Assure E-Business Success. See this technical guide for more information on firewalls.
  • Compaq Evo n800c | Wireless Security - Page 29
    Compaq technical guide cited at other places in this paper, for detail on security measures recommended for corporate servers. Conclusion Pre-wireless . Issues such as subscription fraud, eavesdropping, and denial-of-service attacks acquire even greater weight because of the difficulty in tracing
  • Compaq Evo n800c | Wireless Security - Page 30
    -wwen.html. "MultiPort Technology Overview" (Compaq White Paper, March 2001), http://www.compaq.com/support/techpubs/whitepapers/14zm-0501a-wwen.html. "MultiPort Wireless Local Area Networking" (Compaq White Paper, May 2001), http://www.compaq.com/support/techpubs/whitepapers/14zl-0501a-wwen.html
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

White Paper
December 2001
Prepared by:
Access Business Group
Compaq Computer Corporation
Contents
Introduction
.................................
3
Security in General
.....................
3
Essential Elements of
Security
.....................................
4
Security and the Pipe
.................
4
Device Security
.........................
5
Connectivity Technologies
........
9
Access Points
..........................
24
Corporate Firewalls
.................
27
Application and Data Servers.. 28
Conclusion
................................
29
Bibliography
..............................
30
Wireless Security
Abstract:
People and corporations are using wireless technologies
at astonishing rates to take advantage of the benefits of wireless-
enabled productivity to gain and maintain a competitive edge.
Market researcher Cahners In-Stat estimates that 6.2 million wireless
devices will be shipped worldwide this year (2001), and double that
in two years.
This paper looks at the pieces of the “pipe” of access from the device
to the corporate firewall in an attempt to bring an awareness to both
the user and the corporate IT manager as to where the security
vulnerabilities lie and what can be done to improve security. Many
of the vulnerabilities can be alleviated easily by implementing
policies for users and adding security layers to the pipe. To put the
subject of wireless security into context, the paper is organized as
follows: First, securing wireless systems in general is discussed, then
securing each point along the access pipe is discussed.