Crackproof wireless apps

Security experts recommend that well-protected wireless applications have:

* Access controls embedded in the wireless device itself, whether it is a personal digital assistant, cell phone or laptop with local-area network access.

* Encryption of data stored on the wireless device.

* Encryption of data before it is sent through the airwaves.

* Key encryption of data traveling through the airwaves (128-bit minimum).

* Firewalls at the access point—the receiving station or gateway between the wired and the wireless LANs.

* Operating system and application-level password protection.

* Intrusion-detection systems to monitor signs of unauthorized traffic.

They also recommend that users be well-versed in security issues.

Featured

  • Workforce
    White House rainbow light shutterstock ID : 1130423963 By zhephotography

    White House rolls out DEIA strategy

    On Tuesday, the Biden administration issued agencies a roadmap to guide their efforts to develop strategic plans for diversity, equity, inclusion and accessibility (DEIA), as required under a as required under a June executive order.

  • Defense
    software (whiteMocca/Shutterstock.com)

    Why DOD is so bad at buying software

    The Defense Department wants to acquire emerging technology faster and more efficiently. But will its latest attempts to streamline its processes be enough?

Stay Connected