Wireless Security

3469 Words Nov 17th, 2000 14 Pages
Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.

Purpose of the Study
The purpose of the study was to assist in the decision whether Lotus Development should extend current security policies to encompass wireless devices. The following are critical security
…show more content…
Because of the great diversity of device capabilities, as well as their inherent security limitations, MSD cannot provide security for data stored locally across every device. Instead, MSD provides security for corporate data inside the firewall, by securing it against unauthorized access by wireless devices.

In particular, MSD provides administrators with the ability to (Cohen, 1991):
· Associate a specific, authorized user with each mobile device ("Trusted Devices").
· Specify what wireless networks can communicate with MSD ("Trusted IP Addresses").
Trusted Devices

MSD 's Trusted Devices feature enables administrators both to know what employee is authorized to use each device, and to control the ability of each user or device to access Domino via MSD. For example, if an employee loses his or her mobile device, an administrator can immediately disable the use of that device with MSD, thus eliminating the risk that an impostor will access the network.

In addition to Trusted Devices, MSD offers a related security feature called Dynamic Device/User Mapping. It works like this: the first time a user successfully enters a valid Domino HTTP username and password from a properly registered mobile
Open Document