Crackproof wireless apps

Security experts recommend that well-protected wireless applications have:

* Access controls embedded in the wireless device itself, whether it is a personal digital assistant, cell phone or laptop with local-area network access.

* Encryption of data stored on the wireless device.

* Encryption of data before it is sent through the airwaves.

* Key encryption of data traveling through the airwaves (128-bit minimum).

* Firewalls at the access point—the receiving station or gateway between the wired and the wireless LANs.

* Operating system and application-level password protection.

* Intrusion-detection systems to monitor signs of unauthorized traffic.

They also recommend that users be well-versed in security issues.

Featured

  • Workforce
    The Pentagon (Photo by Ivan Cholakov / Shutterstock)

    Esper says he didn't seek the authority to gut DOD unions

    Defense Secretary Mark Esper told lawmakers he was waiting for a staff analysis of a recent presidential memo before deciding whether to leverage new authority.

  • CLOUD
    pentagon cloud

    Court orders temporary block on JEDI

    JEDI, the Defense Department’s multi-billion-dollar cloud procurement, is officially on hold, according to a federal court announcement Feb. 13.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.