Closing wireless backdoors.

Autor: Havenstein, Heather H.
Předmět:
Zdroj: Federal Computer Week; 8/30/2004, Vol. 18 Issue 30, p18-20, 3p, 2 Color Photographs
Abstrakt: This article deals with the emergence of wireless networking in the U.S. that is allegedly responsible for the growth of rogue users and devices that can cause security breaches, as of August 2004. With the majority of laptop computers being shipped with wireless access cards and the growth of Wireless-Fidelity hot spots increasing wireless signals, many government agency officials may allegedly have unauthorized users and non-sanctioned radio signal broadcasts in their buildings that can endanger the security of agency networks. To purge rogue users from their ranks, many agencies are using technology designed to scan wireless networks for unauthorized users or those not confirming to agency wireless security policies. A report by the Department of Homeland Security's (DHS) inspector general found that DHS lacked the ability to prevent unauthorized users from connecting to its networks because unauthorized wireless devices were broadcasting beyond agency facilities to public roads and private residences. According to Anil Khatod, president and chief executive officer of AirDefense Inc., which markets technology for monitoring wireless local-area networks, the wireless signal bypasses the physical security of a facility, and bypasses the firewall. INSETS: Monitoring wireless traffic;The payback;Do your homework.
Databáze: Supplemental Index