1 / 7

Wireless Security: Protect yourself when you’re mobile

Wireless Security: Protect yourself when you’re mobile. Wireless Security: It’s not Just for Laptops. Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax.

Download Presentation

Wireless Security: Protect yourself when you’re mobile

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Security: Protect yourself when you’re mobile

  2. Wireless Security:It’s not Just for Laptops Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax. Wireless security is not just for laptops: consider these wireless devices • Cell phones • Blackberry Devices • PocketPC

  3. Cellular Devices • Cellular phones are not considered secure devices • Traditionally do not contain options or features to increase security. • Usually contain valuable information • Phone numbers, contact information, calendarfunctions, photos, voice recording options, etc. • Protect your cellular device from loss or damage • Use whatever security features are possible, including locking your phone with a password or security code.

  4. PDAs(Blackberries, PalmPilots, etc) • Use password protection, if available. Be sure to use a strong password. • Where possible, data transmissions from a PDA should be encrypted. • Ethernet, Bluetooth, and other wireless access to the PDA should be disabled when not in use. • Wireless access should be configured to request the user for confirmation before connecting to anything. • Be cautious when opening any attachments, as they could include software harmful to your PDA.

  5. Laptop Safety and Wireless Guidelines • Password protect your laptop • Follow a security checklist. An examplecan be found on the SecurePurdue website: http://www.purdue.edu/securepurdue/bestPractices/mobileDevice.cfm • Do not leave your laptop unattended, and be sure to store it in a secure location when not in use • Wireless access should require user authentication before connecting to the computer • Disable wireless access when not in use • Only use secure wireless connections: a secure wireless connection has a padlock icon next to it

  6. Before you connect… • Only connect to secure wireless networks • Secure networks will be noted with the gold lock icon • Connect only to networksyou know and trust • Limit what sites you visit when using wireless networks • Don’t access sensitive information on unsecured sites while traveling • There may be “imposter” PAL (Purdue Air Link) 2.0networks that are notsecure, and are notPurdue networks. The non-Purdue 2.0 networks will exist outside/on the border of the area PAL 2.0 reaches

  7. Resources • Mobile Device Security Guidelines http://www.purdue.edu/securepurdue/bestPractices/mobileDevice.cfm • Security Checklist http://www.purdue.edu/securepurdue/docs/securityChecklist.pdf • Security While Traveling http://www.purdue.edu/securepurdue/bestPractices/traveling.cfm

More Related