White Paper
December 2001
Prepared by:
Access Business Group
Compaq Computer Corporation
Contents
Introduction................................. 3
Security in General ..................... 3
Essential Elements of
Security ..................................... 4
Security and the Pipe ................. 4
Device Security ......................... 5
Connectivity Technologies ........ 9
Access Points.......................... 24
Corporate Firewalls ................. 27
Application and Data Servers.. 28
Conclusion ................................ 29
Bibliography.............................. 30
Wireless Security
Abstract: People and corporations are using wireless technologies
at astonishing rates to take advantage of the benefits of wireless-
enabled productivity to gain and maintain a competitive edge.
Market researcher Cahners In-Stat estimates that 6.2 million wireless
devices will be shipped worldwide this year (2001), and double that
in two years.
This paper looks at the pieces of the “pipe” of access from the device
to the corporate firewall in an attempt to bring an awareness to both
the user and the corporate IT manager as to where the security
vulnerabilities lie and what can be done to improve security. Many
of the vulnerabilities can be alleviated easily by implementing
policies for users and adding security layers to the pipe. To put the
subject of wireless security into context, the paper is organized as
follows: First, securing wireless systems in general is discussed, then
securing each point along the access pipe is discussed.