Compaq Evo n800c Wireless Security - Page 3

Introduction, Security in General - parts

Page 3 highlights

Wireless Security White Paper 3 Introduction Wireless networks connect computers in offices or homes to other computers, or to devices such as printers, by using radio or infrared signals instead of cables and jacks. Since wireless networks dispense with cables, users connected to wireless computer networks (or wirelessly connected to computer networks) can roam around with the machines they use to gain access to such networks. This ability to function in "untethered" mode is a great convenience. Users and corporations are using wireless technologies at astonishing rates to take advantage of the benefits of wireless-enabled productivity to gain and maintain a competitive edge. Market researcher Cahners In-Stat estimates that 6.2 million wireless devices will be shipped worldwide this year (2001), and double that in two years.1 The pervasiveness of sending and receiving data via wireless networks to the Internet and corporate intranets has presented users of access devices and corporations with new concerns about vulnerability to security breaches. Wireless access technologies have been called "one of the newest and potentially most dangerous security holes in U.S. business."2 Experts estimate that most of the wireless networks in operation today have no security whatsoever. This is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the appropriate measures in place. This paper will look at the pieces of the "pipe" of access from the device to the corporate firewall in an attempt to bring an awareness to both the user and the corporate IT manager as to where the security vulnerabilities lie and what can be done to improve security. Many of the vulnerabilities can be alleviated easily by implementing policies for users and adding security layers to the pipe. To put the subject of wireless security into context, the paper is organized as follows: First, securing wireless systems in general is discussed, then securing each point along the access pipe is discussed. A significant part of wireless network security overlaps with security designed for wired networks. This is particularly so where firewalls, virtual private networks, and corporate servers are concerned. Please see the Compaq Technical Guide titled "Safe Computing and E-Business: Protecting the Enterprise to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing corporate network security. For complete wireless and mobile security solutions, please contact Compaq Global Services at http://www.compaq.com/services/index_infrastructure.html. Security in General It is important to realize from the outset that no single measure may be adequate to address security in wirelessly enabled networks. Both wired and wireless security implementations must be constantly evaluated and improved as people find new ways to gain unauthorized access to sensitive data. To plan a security business model, key elements of security must be considered as each point of access is examined. 1 Lee Gomes, "Often unguarded wireless networks can be eavesdroppers' gold mine" (Wall Street Journal Online, April 27, 2001). 2 Gomes.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

Wireless Security White Paper
3
Introduction
Wireless networks connect computers in offices or homes to other computers, or to devices such
as printers, by using radio or infrared signals instead of cables and jacks. Since wireless networks
dispense with cables, users connected to wireless computer networks (or wirelessly connected to
computer networks) can roam around with the machines they use to gain access to such networks.
This ability to function in "untethered" mode is a great convenience.
Users and corporations are using wireless technologies at astonishing rates to take advantage of
the benefits of wireless-enabled productivity to gain and maintain a competitive edge. Market
researcher Cahners In-Stat estimates that 6.2 million wireless devices will be shipped worldwide
this year (2001), and double that in two years.
1
The pervasiveness of sending and receiving data via wireless networks to the Internet and
corporate intranets has presented users of access devices and corporations with new concerns
about vulnerability to security breaches. Wireless access technologies have been called "one of
the newest and potentially most dangerous security holes in U.S. business."
2
Experts estimate that
most of the wireless networks in operation today have no security whatsoever. This is so in part
because many users are not aware of specific security vulnerabilities or don’t understand the
magnitude of potential loss and, therefore, do not put the appropriate measures in place. This
paper will look at the pieces of the “pipe” of access from the device to the corporate firewall in an
attempt to bring an awareness to both the user and the corporate IT manager as to where the
security vulnerabilities lie and what can be done to improve security. Many of the vulnerabilities
can be alleviated easily by implementing policies for users and adding security layers to the pipe.
To put the subject of wireless security into context, the paper is organized as follows: First,
securing wireless systems in general is discussed, then securing each point along the access pipe
is discussed.
A significant part of wireless network security overlaps with security designed for wired
networks. This is particularly so where firewalls, virtual private networks, and corporate servers
are concerned. Please see the Compaq Technical Guide titled “Safe Computing and E-Business:
Protecting the Enterprise to Assure E-Business Success”
(
February, 2000) for important detail on best practices and established technologies for managing
corporate network security.
For complete wireless and mobile security solutions, please contact Compaq Global Services at
.
Security in General
It is important to realize from the outset that no single measure may be adequate to address
security in wirelessly enabled networks. Both wired and wireless security implementations must
be constantly evaluated and improved as people find new ways to gain unauthorized access to
sensitive data. To plan a security business model, key elements of security must be considered as
each point of access is examined.
1
Lee Gomes, "Often unguarded wireless networks can be eavesdroppers’ gold mine" (Wall Street Journal Online, April 27, 2001).
2
Gomes.