{"id":82,"date":"2005-03-03T00:00:00","date_gmt":"2005-03-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/03\/security-layers-improve-wi-fi-defenses\/"},"modified":"2021-12-30T11:36:28","modified_gmt":"2021-12-30T11:36:28","slug":"security-layers-improve-wi-fi-defenses","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/03\/03\/security-layers-improve-wi-fi-defenses\/","title":{"rendered":"Security layers improve Wi-Fi defenses"},"content":{"rendered":"<p>Wireless networks are inherently insecure, but the more layers of security they have, the less likely they are to be attacked, said Mischel Kwon, wireless security officer for the Justice Department&#8217;s Management Division.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaking at the Wireless\/RFID Conference and Exhibition in Washington, D.C., Kwon said the most secure layered approached would use the latest wireless grid technologies in combination with wireless intrusion-detection systems.<\/p>\n<p>Because of the insecurities inherent in wireless technologies, a lot of fear exists, said Capt.  &#8220;We&#8217;re a rather risk-averse bunch,&#8221; she said.<\/p>\n<p>But attitudes toward wireless networks are changing as Defense Department officials learn more about managing risk with new technologies, she added.  Few agencies, he said, are using layered security or &#8220;defense in depth&#8221; correctly when deploying wireless technologies.  And on the policy side, he said, agencies need to ask who has the authority to accept risk for the organization when people begin using such technologies.<\/p>\n<p>Wireless expert Bill Neugent, chief engineer for cybersecurity at Mitre, a nonprofit engineering organization, said that the proliferation of wireless technologies such as radio frequency identification chips and nanoscale &#8220;smart dust&#8221; will cause both privacy losses and productivity gains.<\/p>\n<p>According to other wireless experts who offered tips on security technologies and policies, open-source products are the most popular for auditing the security of wireless networks.  For the most part, wireless networks become open to attack because administrators fail to properly configure wireless access points with password protection, use no encryption, have no virtual private network protection, and do not disable the infrared ports and peer-to-peer features of their wireless networks, Kwon said.<\/p>\n<p>http:\/\/www.usatoday.com\/tech\/news\/computersecurity\/infotheft\/2005-03-02-security-layers_x.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-82","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/82","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=82"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/82\/revisions"}],"predecessor-version":[{"id":2569,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/82\/revisions\/2569"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=82"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=82"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=82"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}