Results 1 to 4 of 4

Thread: List of Security Risks in Wireless Computing Environment and solutions

  1. #1
    Join Date
    Apr 2009
    Posts
    78

    List of Security Risks in Wireless Computing Environment and solutions

    Hello,

    I learn that there are lots of security Risk to the wireless computer, can anyone suggest few of them here with their individual pros n cons that would be really taking into consideration while making choice between wired connection as well as wireleless connection.

    Any help would be greately appreciated.

  2. #2
    Join Date
    Oct 2008
    Posts
    161

    Re: List of Security Risks In The Wireless Computing Environment and solutions

    The heart of the security problem in the wireless security setting is that networks are at heart an amalgam of independent processing units and the architecture itself is resistant to controls.

    Ease of access itself represents the greatest security challenge. The very navigation protocols that make it possible for users of a wireless network to find their destination nodes leave vulnerabilities for those who would use the network in an unethical, harmful or illegal manner.

    A second level of threat to the network are rogue access points both within the network or department or from outside of the network firewall.

    Unauthorized use of network services represents a threat to the security of the system as well.“Hacking” of this nature is a very serious problem particularly for network clients whose software and data repositories are of a sensitive and/or financial nature.

    Another devious mythology used by network attackers is spoofing and session hijacking. Using the open nature of the network and sophisticated detection tools, the network hacker can simulate legitimate network directional information.

  3. #3
    Join Date
    Oct 2008
    Posts
    161

    Re: List of Security Risks In The Wireless Computing Environment and solutions

    pros for wireless computing environment:

    Authentication is an access control method that is well understood by the network users. Utilizing the login and password system, authentication not only permits network security to know who is utilizing the system and to control their access easily, it affords the ability to control with precision how each user can use the system, the level of security they can be granted and the level of impact each user is permitted to have on the data resources and network performance.


    Encryption has its value in a wireless security plan because it defends against spoofing, session hijacking or external unauthorized monitoring of the network. Encryption of the user name and password does enter into the authentication plan but only by way of securing those codes against possible identity theft. Within the operation of the network, encryption of packet data transverseing the network does provide a higher defense against network compromise coming from a hacker learning of network data flows as well as access to sensitive data.

    The Wi-Fi Protected Security Specification – The WPA
    The most significant leap forward toward a universally applicable wireless security specification was the release of the Wi-Fi Protected Access (WPA) Security Specification.

    The WPA addressed in detail and put standardized protocols in place for the highest level security measures that needed to become stabilized and supported across the board.

  4. #4
    Join Date
    Oct 2008
    Posts
    161

    Re: List of Security Risks In The Wireless Computing Environment and solutions

    Securing Wireless Networks

    DMZ – Adding this to your network enables you to put your wireless network on an untrusted segment of your network.

    Firewalls – Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn't go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:

    - ZoneAlarm (an inexpensive based software firewall) Zonelabs.com

    - Symantec has many different firewalls depending what you require.


    PKI - Public-key infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet.

    Site Surveys – Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks.

    Proactive Approaches

    Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks.

    Honeypots – are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec.

Similar Threads

  1. How to reduce security risks of cloud computing
    By Edmund-Windows in forum Networking & Security
    Replies: 5
    Last Post: 25-12-2010, 05:10 AM
  2. Benefits and risks for cloud computing
    By Aandaleeb in forum Networking & Security
    Replies: 6
    Last Post: 29-12-2009, 12:09 AM
  3. Web 2.0: update on the security risks
    By Ninad23 in forum Guides & Tutorials
    Replies: 1
    Last Post: 10-04-2009, 05:30 PM
  4. Replies: 2
    Last Post: 03-03-2009, 04:54 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,979,906.11208 seconds with 17 queries