List of Security Risks in Wireless Computing Environment and solutions
Hello,
I learn that there are lots of security Risk to the wireless computer, can anyone suggest few of them here with their individual pros n cons that would be really taking into consideration while making choice between wired connection as well as wireleless connection.
Any help would be greately appreciated.
Re: List of Security Risks In The Wireless Computing Environment and solutions
The heart of the security problem in the wireless security setting is that networks are at heart an amalgam of independent processing units and the architecture itself is resistant to controls.
Ease of access itself represents the greatest security challenge. The very navigation protocols that make it possible for users of a wireless network to find their destination nodes leave vulnerabilities for those who would use the network in an unethical, harmful or illegal manner.
A second level of threat to the network are rogue access points both within the network or department or from outside of the network firewall.
Unauthorized use of network services represents a threat to the security of the system as well.“Hacking” of this nature is a very serious problem particularly for network clients whose software and data repositories are of a sensitive and/or financial nature.
Another devious mythology used by network attackers is spoofing and session hijacking. Using the open nature of the network and sophisticated detection tools, the network hacker can simulate legitimate network directional information.
Re: List of Security Risks In The Wireless Computing Environment and solutions
pros for wireless computing environment:
Authentication is an access control method that is well understood by the network users. Utilizing the login and password system, authentication not only permits network security to know who is utilizing the system and to control their access easily, it affords the ability to control with precision how each user can use the system, the level of security they can be granted and the level of impact each user is permitted to have on the data resources and network performance.
Encryption has its value in a wireless security plan because it defends against spoofing, session hijacking or external unauthorized monitoring of the network. Encryption of the user name and password does enter into the authentication plan but only by way of securing those codes against possible identity theft. Within the operation of the network, encryption of packet data transverseing the network does provide a higher defense against network compromise coming from a hacker learning of network data flows as well as access to sensitive data.
The Wi-Fi Protected Security Specification – The WPA
The most significant leap forward toward a universally applicable wireless security specification was the release of the Wi-Fi Protected Access (WPA) Security Specification.
The WPA addressed in detail and put standardized protocols in place for the highest level security measures that needed to become stabilized and supported across the board.
Re: List of Security Risks In The Wireless Computing Environment and solutions
Securing Wireless Networks
DMZ – Adding this to your network enables you to put your wireless network on an untrusted segment of your network.
Firewalls – Firewalls are all over the place. Firewalls range from hardware to software versions. By adding a firewall between the wireless network and wired network helps prevent hackers from accessing your wired network. This paper doesn't go into specifics about different firewalls and how to set them up, but there are many. Some of the firewalls include:
- ZoneAlarm (an inexpensive based software firewall) Zonelabs.com
- Symantec has many different firewalls depending what you require.
PKI - Public-key infrastructure (PKI) is the combination of software, encryption technologies, and services that enables enterprises to protect the security of their communications and business transactions on the Internet.
Site Surveys – Site Surveys involve using a software package and a wireless device to probe your network for Access Points and security risks.
Proactive Approaches
Since wireless technology is insecure, companies or anyone can take a proactive approach to try and identify hackers trying to gain access via wireless networks.
Honeypots – are fake networks setup to try and lure in hackers. This enables administrators to find out more about what type of techniques hackers are using to gain access. One product is Mantrap created by Symantec.