New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 977
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image wireless: Commentaries: Wireless dilemma: Security isn't cool image
Wireless
Wireless dilemma: Security isn't cool
By Leo Pluswick
Special to ZDNet

COMMENTARY--Wireless communication has dramatically changed the way people work and interact. Unfortunately, the wireless era also continues to be plagued by insufficient security, and both corporations and users are being put at risk.

To be sure, cell phones, personal digital assistants and wireless laptops have helped usher in an era of mobile computing that's marked by increased productivity and fast return on investment.

At the same time, however, customers are demanding better security services and are adamant that any associated costs be transparent. They also want to continue to use their previous investments in legacy wireless hardware. But gathering indications suggest that the scramble to get to market with feature-laden technologies may be coming at the expense of better security.

Wireless suppliers have offered up a couple of approaches that fall under the rubric of robust security networks (RSN). Proponents argue that this will resolve the remaining access problems and confidentiality vulnerabilities older 802.11 products have. Customers are demanding better security services and are adamant that any associated costs be transparent.

Opponents counter that truly effective security is not a feature and that RSN will only delay the acceptance of something more secure.

The first solution, based on an emerging Institute of Electrical and Electronics Engineers 802.11i security-enhancing option, is found in the Wi-Fi Alliance's Wi-Fi Protected Access (WPA) products. A second solution, which won't be available until 2004, when the 802.11i specification is ready for publication, is believed to be more secure.

The WPA solution does an adequate job of answering the basic security needs of wireless local area network (WLAN) users. It also is already available and--unlike the latter option--offers backward compatibility with existing legacy WLAN hardware.

That's an important consideration for customers who still want service out of existing equipment and who are in no mood to ante up for new infrastructure.

In this instance, security takes a back seat to the bottom line. Buyers may be willing to take security risks in order to avoid making more expensive investments, especially at a time when they may be cash-constrained. Suppliers know that and are responding to demand, eager for a quick infusion of revenue at a time when it is most welcome.

So if you do adopt the WPA solution as a de facto WLAN security option, keep in mind the following:

• Users and companies may become more complacent and therefore delay the acceptance of the more fully baked and more secure RSN option.

• The solution may not be used as required, so the level of security protection possible may not be obtained.

• It may encourage the use of non-RSN, legacy products in a WLAN, thereby reducing the security of the WLAN to that delivered by the non-RSN products.

How many IT departments believe that all the users on their corporate networks are disciplined enough to always use security features or use them properly?
• The WPA products assume a high level of technical savvy on behalf of the user and may therefore instill a false sense of security in an unsuspecting user who is not using the option properly.

Unfortunately, users may be tempted to choose the less secure option, because it offers the easy route. The WPA products are available, backwards-compatible and offer improved security. But how many IT departments believe that all the users on their corporate networks are disciplined enough to always use security features or use them properly?

In the short term, recently trained users will be disciplined enough to get the desired security. But after some time, they are bound to get lazy and revert to bad habits. The upshot: Security goes out the window.

WLAN companies may believe that they have answered the call for more secure networks, and people assume that they are receiving better security. But is that the reality on the ground? The question still lingers. It will be interesting to see whether time to market and new features once again undermine the quest for better security.

biography
Leo Pluswick is the program manager for the development and execution of ICSA Labs' product certification programs for cryptography, Internet Protocol security and wireless LAN security. He has 39 years of experience as an electronic engineer, planner and manager in industry, the U.S. Army and the National Security Agency.


ZDN
Posted on Wednesday, 12 November 2003 @ 04:20:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· HotScripts
· W3 Consortium
· ZDNet News
· More about Wireless
· News by phoenix22


Most read story about Wireless:
First Ever GSM Cellphone Exploit

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register