HP Evo n180 Wireless Security - Page 3
Introduction, Security in General - specifications
View all HP Evo n180 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 3 highlights
Wireless Security White Paper 3 Introduction Wireless networks connect computers in offices or homes to other computers, or to devices such as printers, by using radio or infrared signals instead of cables and jacks. Since wireless networks dispense with cables, users connected to wireless computer networks (or wirelessly connected to computer networks) can roam around with the machines they use to gain access to such networks. This ability to function in "untethered" mode is a great convenience. Users and corporations are using wireless technologies at astonishing rates to take advantage of the benefits of wireless-enabled productivity to gain and maintain a competitive edge. Market researcher Cahners In-Stat estimates that 6.2 million wireless devices will be shipped worldwide this year (2001), and double that in two years.1 The pervasiveness of sending and receiving data via wireless networks to the Internet and corporate intranets has presented users of access devices and corporations with new concerns about vulnerability to security breaches. Wireless access technologies have been called "one of the newest and potentially most dangerous security holes in U.S. business."2 Experts estimate that most of the wireless networks in operation today have no security whatsoever. This is so in part because many users are not aware of specific security vulnerabilities or don't understand the magnitude of potential loss and, therefore, do not put the appropriate measures in place. This paper will look at the pieces of the "pipe" of access from the device to the corporate firewall in an attempt to bring an awareness to both the user and the corporate IT manager as to where the security vulnerabilities lie and what can be done to improve security. Many of the vulnerabilities can be alleviated easily by implementing policies for users and adding security layers to the pipe. To put the subject of wireless security into context, the paper is organized as follows: First, securing wireless systems in general is discussed, then securing each point along the access pipe is discussed. A significant part of wireless network security overlaps with security designed for wired networks. This is particularly so where firewalls, virtual private networks, and corporate servers are concerned. Please see the Compaq Technical Guide titled "Safe Computing and E-Business: Protecting the Enterprise to Assure E-Business Success" (http://activeanswers.compaq.com/ActiveAnswers/Render/1,1027,1317-6-100-225-1,00.html February, 2000) for important detail on best practices and established technologies for managing corporate network security. For complete wireless and mobile security solutions, please contact Compaq Global Services at http://www.compaq.com/services/index_infrastructure.html. Security in General It is important to realize from the outset that no single measure may be adequate to address security in wirelessly enabled networks. Both wired and wireless security implementations must be constantly evaluated and improved as people find new ways to gain unauthorized access to sensitive data. To plan a security business model, key elements of security must be considered as each point of access is examined. 1 Lee Gomes, "Often unguarded wireless networks can be eavesdroppers' gold mine" (Wall Street Journal Online, April 27, 2001). 2 Gomes.