Compaq Evo n800c Wireless Security - Page 5

Device Security - notebook

Page 5 highlights

Wireless Security White Paper 5 - (This aspect of security is not covered in this paper, since securing data from unauthorized access behind the firewall is not a wireless security concern, but a wired one.) Figure 1 illustrates the pipe. Figure 1: The Network Pipe The vertical yellow lines in Figure 1 represent the pivotal points of data transfer. The horizontal lines represent data traveling from one place to the next either wired or wirelessly. The entire pipe must be considered in planning security models. Each element of the pipe, along with the security problems and solutions associated with it, is discussed in the next five subsections. Device Security Despite the growing popularity of handheld PCs, PDAs, and cellular telephones, the truly ubiquitous mobile computing device in the United States is still the notebook computer (in Europe it is the mobile telephone). Notebook computers are used for online connectivity, Internet surfing, organization of information such as contact lists and tasks, storage of vast amounts of data, hosting of numerous client applications, and creation of primary content such as documents, e-mail messages, and spreadsheets.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30

Wireless Security White Paper
5
(This aspect of security is not covered in this paper, since securing data from
unauthorized access behind the firewall is not a wireless security concern, but a wired
one.)
Figure 1 illustrates the pipe.
Figure 1: The Network Pipe
The vertical yellow lines in Figure 1 represent the pivotal points of data transfer. The horizontal
lines represent data traveling from one place to the next either wired or wirelessly. The entire pipe
must be considered in planning security models. Each element of the pipe, along with the security
problems and solutions associated with it, is discussed in the next five subsections.
Device Security
Despite the growing popularity of handheld PCs, PDAs, and cellular telephones, the truly
ubiquitous mobile computing device in the United States is still the notebook computer (in
Europe it is the mobile telephone). Notebook computers are used for online connectivity, Internet
surfing, organization of information such as contact lists and tasks, storage of vast amounts of
data, hosting of numerous client applications, and creation of primary content such as documents,
e-mail messages, and spreadsheets.