21-09-2017, 12:06 PM
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity and lower installation costs. Wireless local area network (WLAN) devices for example, allow users to move their laptops from one place to another within their offices without the need for cables and without losing network connectivity.
Ad hoc networks, such as those enabled by Bluetooth, allow users to:
Data synchronization with network systems and application sharing between devices.
Eliminates cables for printers and other peripheral device connections.
Synchronize personal databases.
Provide access to network services such as wireless e-mail, web browsing and Internet access.
However, the risks are inherent in any wireless technology. Loss of confidentiality and the integrity and threat of Denial of Service (DoS) attacks are the risks typically associated with wireless communications. The specific threats and vulnerabilities for wireless networks and handheld devices are as follows:
All vulnerabilities that exist in a conventional wired network apply to wireless technologies.
Malicious entities can gain unauthorized access to an agency's computer network through wireless connections, avoiding any firewall protection.
Sensitive information that is not encrypted (or encrypted with poor cryptographic techniques) and transmitted between two wireless devices may be intercepted and reported.
Confidential data may be corrupted during incorrect synchronization.
Data can be extracted without detection of incorrectly configured devices.
Ad hoc networks, such as those enabled by Bluetooth, allow users to:
Data synchronization with network systems and application sharing between devices.
Eliminates cables for printers and other peripheral device connections.
Synchronize personal databases.
Provide access to network services such as wireless e-mail, web browsing and Internet access.
However, the risks are inherent in any wireless technology. Loss of confidentiality and the integrity and threat of Denial of Service (DoS) attacks are the risks typically associated with wireless communications. The specific threats and vulnerabilities for wireless networks and handheld devices are as follows:
All vulnerabilities that exist in a conventional wired network apply to wireless technologies.
Malicious entities can gain unauthorized access to an agency's computer network through wireless connections, avoiding any firewall protection.
Sensitive information that is not encrypted (or encrypted with poor cryptographic techniques) and transmitted between two wireless devices may be intercepted and reported.
Confidential data may be corrupted during incorrect synchronization.
Data can be extracted without detection of incorrectly configured devices.