Wireless Security: Protect yourself when you’re mobile

advertisement
Wireless Security:
Protect yourself
when you’re mobile
Wireless Security:
It’s not Just for Laptops
Wireless communication is convenient, and for the most
part, available almost anywhere. Common types of
wireless communication are Bluetooth, WiFi, and WiMax.
Wireless security is not just for laptops: consider these
wireless devices
• Cell phones
• Blackberry Devices
• PocketPC
Cellular Devices
 Cellular phones are not considered secure
devices
• Traditionally do not contain options
or features to increase security.
 Usually contain valuable information
• Phone numbers, contact information, calendar
functions, photos, voice recording options, etc.
 Protect your cellular device from loss or
damage
 Use whatever security features are possible,
including locking your phone with a password
or security code.
PDAs
(Blackberries, PalmPilots, etc)
 Use password protection, if available.
Be sure to use a strong password.
 Where possible, data transmissions
from a PDA should be encrypted.
 Ethernet, Bluetooth, and other wireless access to the
PDA should be disabled when not in use.
 Wireless access should be configured to request the
user for confirmation before connecting to anything.
 Be cautious when opening any attachments, as they
could include software harmful to your PDA.
Laptop Safety and Wireless Guidelines
 Password protect your laptop
 Follow a security checklist. An example
can be found on the SecurePurdue website:
http://www.purdue.edu/securepurdue/bestPractices/
mobileDevice.cfm
 Do not leave your laptop unattended, and be sure to
store it in a secure location when not in use
 Wireless access should require user authentication
before connecting to the computer
 Disable wireless access when not in use
 Only use secure wireless connections: a secure
wireless connection has a padlock icon next to it
Before you connect…
 Only connect to secure wireless networks
• Secure networks will be noted with the gold lock icon
 Connect only to networks
you know and trust
 Limit what sites you visit
when using wireless networks
 Don’t access sensitive
information on unsecured
sites while traveling
 There may be “imposter”
PAL (Purdue Air Link) 2.0
networks that are not
secure, and are not
Purdue networks. The nonPurdue 2.0 networks
will exist outside/on the
border of the area PAL 2.0
reaches
Resources
 Mobile Device Security Guidelines
http://www.purdue.edu/securepurdue/bestPr
actices/mobileDevice.cfm
 Security Checklist
http://www.purdue.edu/securepurdue/docs/s
ecurityChecklist.pdf
 Security While Traveling
http://www.purdue.edu/securepurdue/bestPr
actices/traveling.cfm
Download