slide1
Download
Skip this Video
Download Presentation
Wireless Security: Protect yourself when you’re mobile

Loading in 2 Seconds...

play fullscreen
1 / 7

Wireless Security: Protect yourself when you’re mobile - PowerPoint PPT Presentation


  • 524 Views
  • Uploaded on

Wireless Security: Protect yourself when you’re mobile Wireless Security: It’s not Just for Laptops Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Wireless Security: Protect yourself when you’re mobile' - Samuel


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1
Wireless Security:

Protect yourself

when you’re mobile

wireless security it s not just for laptops
Wireless Security:It’s not Just for Laptops

Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax.

Wireless security is not just for laptops: consider these wireless devices

  • Cell phones
  • Blackberry Devices
  • PocketPC
cellular devices
Cellular Devices
  • Cellular phones are not considered secure devices
    • Traditionally do not contain options or features to increase security.
  • Usually contain valuable information
    • Phone numbers, contact information, calendarfunctions, photos, voice recording options, etc.
  • Protect your cellular device from loss or damage
  • Use whatever security features are possible, including locking your phone with a password or security code.
pdas blackberries palmpilots etc
PDAs(Blackberries, PalmPilots, etc)
  • Use password protection, if available. Be sure to use a strong password.
  • Where possible, data transmissions from a PDA should be encrypted.
  • Ethernet, Bluetooth, and other wireless access to the PDA should be disabled when not in use.
  • Wireless access should be configured to request the user for confirmation before connecting to anything.
  • Be cautious when opening any attachments, as they could include software harmful to your PDA.
laptop safety and wireless guidelines
Laptop Safety and Wireless Guidelines
  • Password protect your laptop
  • Follow a security checklist. An examplecan be found on the SecurePurdue website: http://www.purdue.edu/securepurdue/bestPractices/mobileDevice.cfm
  • Do not leave your laptop unattended, and be sure to store it in a secure location when not in use
  • Wireless access should require user authentication before connecting to the computer
  • Disable wireless access when not in use
  • Only use secure wireless connections: a secure wireless connection has a padlock icon next to it
before you connect
Before you connect…
  • Only connect to secure wireless networks
    • Secure networks will be noted with the gold lock icon
  • Connect only to networksyou know and trust
  • Limit what sites you visit when using wireless networks
  • Don’t access sensitive information on unsecured sites while traveling
  • There may be “imposter” PAL (Purdue Air Link) 2.0networks that are notsecure, and are notPurdue networks. The non-Purdue 2.0 networks will exist outside/on the border of the area PAL 2.0 reaches
resources
Resources
  • Mobile Device Security Guidelines http://www.purdue.edu/securepurdue/bestPractices/mobileDevice.cfm
  • Security Checklist http://www.purdue.edu/securepurdue/docs/securityChecklist.pdf
  • Security While Traveling http://www.purdue.edu/securepurdue/bestPractices/traveling.cfm
ad