0 LIKES LikeUnLike
Is anyone aware of software solutions that can help curb security threats bound with wireless PAN?
Tags: aware, Bound, Curb, Help, pan, Security, software, solutions, Threats, wireless
A personal area network (PAN) is a type of computer networking designed for communication among computer devices that includes telephones and personal digital assistants, in proximity to an individual's body. Whereas A WPAN (wireless personal area network) is a personal area network - a network which is used to interconnect devices centered around an individual person's workspace - in which the connections are wireless. Typically, a wireless personal area network uses some technology that permits communication within about 10 metres (33 ft) such as Bluetooth, which was used as the basis for a new standard. SOLUTIONS & SECURITY MEASURES FOR WPAN Wireless Personal Area Network, solutions and improvements are available to help secure WPAN networks. Solutions of security measures include management solutions, operational solutions, and technical solutions Management Solutions. The first line of defence is to supply a adequate grade of information and comprehending for those who will deal with WPAN & Bluetooth enabled devices & networks. Organizations utilising wireless personal area network technology require to set up and document security principles that address the use of Bluetooth enabled devices and the user’s responsibilities. The principle article should encompass a register of accepted values for WPAN’s, the kind of data that may be moved in the network, and any disciplinary activities that may outcome from misuse. The security principle should furthermore identify a correct password usage scheme. Operational Solutions Since Bluetooth devics do not sign-up after they appear at a network, they are invisible to network administrators. Consequently, it is difficult for administrators to request traditional physical protection measures. However, there are numerous protection approaches that can be realized, surrounding positioning spatial distance and securing the origin Bluetooth devices that unite remote Bluetooth networks or devices. Establishing spatial distance requires setting the vitality conditions low enough to prevent a implement operating on the organizations premises from having adequate vitality to be detected into the open physical boundaries. This spatial distance in appearance writes a more shut higher boundary. Currently, Bluetooth devices have a useful range of about 30 feet. Organizations that want both high protection and low level of protection ought continue a shut higher perimeter so that on site network users can continue shut higher overpasses in their office premises. Agencies with conditions for highstoreys of protection ought also enclose unauthorized personnel from engaging PDAs, laptops, and other electronic tools within the shut higherperimeter. (Tom karygiannis, Les Owens, Nov 2002) Technical Solutions As with WLANs and Bluetooth mechanical answers & improvements drop into one of two categories: programs security answers and hardware security solutions. Bluetooth programs answers aim on Personal Identification Number (PIN) and personal authentications, while hardware answers engage the use of the Bluetooth apparatus address and connection keys that reside at the connection level. Again, it should be documented that hardware answers, which usually have programs constituents, are into easily as hardware solutions.
Report (0) (0) | 12 years, 7 month(s) ago
Latest activity: 12 years, 11 month(s) ago. This question has 1 answers.