Skip to main content

Three Security Perimeters Needed For Secure Wireless

posted onNovember 23, 2005
by hitbsecnews

Today’s sophisticated mobile devices can expose the wireless network to the same security vulnerabilities that have plagued conventional wired networks. Denial of service (DoS) attacks, the interception and disclosure of sensitive data, and unauthorized network access are just the beginning.

As mobile technology becomes more widespread and evolves to support ever-more sophisticated business and personal applications, the security threats will only increase—making security of the wireless network infrastructure a key consideration and differentiator for service providers.

Unfortunately, there is no single foolproof strategy against all of the potential threats posed by mobile technologies. To secure their wireless networks against these security threats, service providers must implement a multi-layered, multi-faceted approach to wireless security that mirrors the security infrastructure already in place for wireline networks.

Source

Tags

Wireless

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th