Compaq Evo n800c Wireless Security - Page 1

Compaq Evo n800c - Notebook PC Manual

Page 1 highlights

White Paper December 2001 Prepared by: Access Business Group Compaq Computer Corporation Contents Introduction 3 Security in General 3 Essential Elements of Security 4 Security and the Pipe 4 Device Security 5 Connectivity Technologies ........ 9 Access Points 24 Corporate Firewalls 27 Application and Data Servers.. 28 Conclusion 29 Bibliography 30 Wireless Security Abstract: People and corporations are using wireless technologies at astonishing rates to take advantage of the benefits of wirelessenabled productivity to gain and maintain a competitive edge. Market researcher Cahners In-Stat estimates that 6.2 million wireless devices will be shipped worldwide this year (2001), and double that in two years. This paper looks at the pieces of the "pipe" of access from the device to the corporate firewall in an attempt to bring an awareness to both the user and the corporate IT manager as to where the security vulnerabilities lie and what can be done to improve security. Many of the vulnerabilities can be alleviated easily by implementing policies for users and adding security layers to the pipe. To put the subject of wireless security into context, the paper is organized as follows: First, securing wireless systems in general is discussed, then securing each point along the access pipe is discussed.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

White Paper
December 2001
Prepared by:
Access Business Group
Compaq Computer Corporation
Contents
Introduction
.................................
3
Security in General
.....................
3
Essential Elements of
Security
.....................................
4
Security and the Pipe
.................
4
Device Security
.........................
5
Connectivity Technologies
........
9
Access Points
..........................
24
Corporate Firewalls
.................
27
Application and Data Servers.. 28
Conclusion
................................
29
Bibliography
..............................
30
Wireless Security
Abstract:
People and corporations are using wireless technologies
at astonishing rates to take advantage of the benefits of wireless-
enabled productivity to gain and maintain a competitive edge.
Market researcher Cahners In-Stat estimates that 6.2 million wireless
devices will be shipped worldwide this year (2001), and double that
in two years.
This paper looks at the pieces of the “pipe” of access from the device
to the corporate firewall in an attempt to bring an awareness to both
the user and the corporate IT manager as to where the security
vulnerabilities lie and what can be done to improve security. Many
of the vulnerabilities can be alleviated easily by implementing
policies for users and adding security layers to the pipe. To put the
subject of wireless security into context, the paper is organized as
follows: First, securing wireless systems in general is discussed, then
securing each point along the access pipe is discussed.