Previous Page
Next Page

Chapter 1: Wireless Security Overview

Wireless technologies have given rise to innovative means of communication, greater convenience, and new threats to the network infrastructure. Previous networking technologies assumed some level of direct physical access would be required to attack systems connected to the networking infrastructure. With the advent of wireless connectivity, this assumption no longer holds true.

USE AND SPREAD OF WIRELESS TECHNOLOGIES

The term wireless technology encompasses many things: Global Positioning System (GPS) satellites, AM/FM radio, IEEE 802.11 communications hardware, cellular phone networks, and other devices that communicate without a physical connection between them.

Many businesses and individuals have deployed wireless communications devices in their networks. The advantages realized from this deployment range from the ability to move while connected to the network to the providing of network connectivity in isolated locations, such as weather monitoring stations on mountaintops, communications with ships at sea, and obtaining updated navigational aids from GPS units while driving. Because of the popularity of wireless communications, a new type of service known as the wireless hotspot has arisen-a public location that offers connectivity to the Internet for a small fee, or for free to attract customers to the location.

The convenience and increasingly affordable cost of wireless technology has led to its rapid spread and adoption by many users. Businesses can now use wireless communications hardware to provide network connectivity to various devices without having to run cables through floor panels and ceiling tiles. Individuals can also set up wireless networks at home to share an Internet connection without installing network cabling all over the house. Even the use of wireless connectivity is being sold by businesses setting up wireless hotspots to allow customers to use their laptops to connect to the Internet for a small fee. An added benefit is that now businesses no longer have to deal with the costs involved in managing public computer terminals-customers bring their own laptops!

Some applications of wireless technology are in areas and devices that were not traditionally classified as "computers." Handheld barcode scanners for taking inventory at warehouses, keyless entry systems for cars, wireless headsets for office phones, and wireless video game controllers are just some examples. Taking inventory in a warehouse with a wireless device allows companies to track and update stock and reassign resources for manufacturing, distribution, and billing with a computerized system. Keyless car entry systems allow drivers to push a button on a key fob to unlock car doors. Wireless headsets give office workers greater mobility to access different physical resources such as books, computers, and the coffeemaker while talking to a customer. Wireless video game controllers let you bounce around the room while playing a fast-paced video game-all without yanking a cord out of the gaming console.


Previous Page
Next Page