W&M 2009 – Top Ten Wireless Security Myths


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

W&M 2009 – Top Ten Wireless Security Myths

  1. 1. Top 10 Myths of Wireless Computing [email_address]
  2. 2. GSM Coverage
  3. 3. <ul><li>Estimated that 80% of Global Marker uses GSM </li></ul><ul><li>3 Billion Users </li></ul><ul><li>212 Countries </li></ul><ul><li>Data Services </li></ul><ul><ul><li>GSM Release '97 = GPRS </li></ul></ul><ul><ul><li>GSM Release '99 = EDGE </li></ul></ul><ul><ul><li>2001 = First Commercial Use of 3G </li></ul></ul>Some Statistics
  4. 4. With a 20 year history and such a ubiquitous use of technology surely Wireless Computing is easy?
  5. 5. Goal of Presentation <ul><li>Outline top 10 Myths of Wireless Computing </li></ul>
  6. 6. <ul><li>Myth 10 </li></ul><ul><li>Myth 9 </li></ul><ul><li>Myth 8 </li></ul><ul><li>Myth 7 </li></ul><ul><li>Myth 6 </li></ul><ul><ul><li>Myth 5 </li></ul></ul><ul><ul><li>Myth 4 </li></ul></ul><ul><li>Myth 3 </li></ul><ul><li>Myth 2 </li></ul><ul><li>Myth 1 </li></ul>Agenda
  7. 7. Myth 10 Mobile Data is Everywhere
  8. 8. Mobile Data is Everywhere <ul><li>YES IT IS!! But… </li></ul><ul><li>3G Certainly isn’t </li></ul><ul><li>GPRS not always appropriate </li></ul><ul><li>WAN coverage not ubiquitous </li></ul><ul><li>Hot Spots not secure </li></ul><ul><li>Use of Enterprise & Private WiFi may lead to out of control policy </li></ul>
  9. 9. Myth 9 High Speed Data Access is Here!
  10. 10. High Speed Data Acess is Here <ul><li>Wireless is an inherently shared media and also… </li></ul><ul><li>Example 1 – 3G </li></ul><ul><ul><li>Max Stationary 14.4Mbps </li></ul></ul><ul><ul><li>Likely when moving in vehicle </li></ul></ul><ul><ul><ul><li>184Kbps </li></ul></ul></ul><ul><li>Example 2 – 802.11G </li></ul><ul><ul><li>Max 54Mbps </li></ul></ul><ul><ul><li>Likely when traditional cell planning applied 18/12/9 Mbps divided by 10,20,30 or more users.. </li></ul></ul>
  11. 11. Myth 8 Wireless Data is pretty reliable these days
  12. 12. Wireless Data is Reliable <ul><li>Just like when your mobile voice call drops between cells, data connectivity will drop between cells. </li></ul><ul><ul><li>Data stream will be interrupted </li></ul></ul><ul><ul><li>Sessions will drop </li></ul></ul><ul><ul><li>IP Addresses will change </li></ul></ul><ul><ul><li>Persistence cannot be guaranteed </li></ul></ul>
  13. 13. Myth 7 Private APN’s provide end to end Security
  14. 14. Private APN’s = End to End Security <ul><li>Private APN’s secure data between the SIM and the operator network </li></ul><ul><ul><li>By default backhauled data is not secured </li></ul></ul>
  15. 15. Myth 6 Traditional VPN’s Work well For Mobile Wireless Devices
  16. 16. Traditional VPN’s <ul><li>Traditional VPN’s inherently designed for a connected world – have no comprehension of wireless considerations </li></ul>
  17. 17. Myth 5 IPSec works well For Wireless Just like on my desktop PC
  18. 18. IPSec <ul><li>Source IP Address needs to remain constant </li></ul><ul><li>Will not survive coverage gaps </li></ul><ul><li>Will not survive network media transitions WLAN>WWAN etc </li></ul><ul><li>New protocols such as MOBIKE suffer same underlying problems </li></ul>
  19. 19. Myth 4 SSL Works well for Wireless Just like on my desktop PC
  20. 20. SSL <ul><li>ActiveX, Java or Win32 controls required that are not consistent across all mobile devices </li></ul><ul><li>Can’t handle roaming without data loss </li></ul><ul><li>Can materially degrade performance due to chatty nature of TCP – not great for GPRS.. </li></ul>
  21. 21. Myth 3 Applications Need to be Re-written To work well over Wireless
  22. 22. Application Re-Writes <ul><li>Actually this is traditionally true, however… </li></ul><ul><li>There are specialist technologies out there that solve the problems of desktop applications being unaware of either poor or non existent bandwidth </li></ul><ul><li>These technologies can seamlessly keep applications working whilst on the move </li></ul>
  23. 23. Myth 2 Users will need re-training to make best use of wireless
  24. 24. User Training <ul><li>Well implemented wireless working should look and feel as normal as working at the desktop for a standard user </li></ul><ul><li>Best Practice </li></ul><ul><ul><li>Same authentication mechanisms. </li></ul></ul><ul><ul><li>Seamless roaming. </li></ul></ul><ul><ul><li>Same Apps. </li></ul></ul>
  25. 25. Myth 1 Mobilising Workforces using wireless technologies is easy..
  26. 26. Mobilising Workforces is easy Vast experience in best practice when it comes to getting folks mobile Unique technology that keeps workers connected
  27. 27. Goal of Presentation <ul><li>Outline top 10 Myths of Wireless Computing </li></ul>
  28. 28. www.liplc.com