Wireless LAN Security: What Hackers Know That You Don’t
By
Motorola
Published 2008, Posted March 2009
Abstract:
Because of their flexibility, affordability, and ease of installation, the use of wireless local area networks (wireless LANS, WLANs, and Wi-Fi) are increasing at a tremendous rate. According to In-Stat MDR estimates, there are currently more than 75 million wireless LANs in use worldwide, with 40 million more estimated to begin operation this year. META Group and In-Stat/MDR estimate that 95% of corporate laptop computers that will be shipped in 2005 will be equipped for wireless operation. An equal amount of wireless support devices, such as access points, routers, printers, scanners, and handhelds, are also being produced to meet the demand for wireless.
As wireless LAN deployments increase, so does the challenge to provide these networks with security. Wireless LANs face the same security challenges as their wired counterparts, and more. Because the medium for wireless is air, wireless LANs have the added issue of securing data that travels the airwaves. This has given momentum to a new generation of hackers who specialize in inventing and deploying innovative methods of hijacking wireless communications.
Some enterprises believe they do not have to concern themselves with wireless security if they run non-mission-critical systems with non-sensitive information on their wireless LANs. This can be a costly mistake, since most enterprise wireless LANs connect back to a wired network at some point. Hackers can use a user laptop as an entry point into the entire enterprise network!
|
Return to Motorola Gold Sponsors' Briefing
|
Please note:
By downloading this information, you acknowledge that the sponsor(s) of this
information may contact you, providing that they give you the option of
opting out of further communications from them concerning this information.
Also, by your downloading this information, you agree that the information
is for your personal use only and that this information may not be
retransmitted to others or reposted on another web site. Please encourage
colleagues to download their own copy after
registering at
http://www.webtorials.com/reg/.