Information Technology Reference
In-Depth Information
recent protocols such as the WiFi Protected Access (WPA/WPA2) pro-
tocol provide greater device-to-node encryption, but they do not provide
continuous protection against data interception elsewhere along the route.
For remote Web connectivity, Secure Sockets Layer (SSL) transport is
mandatory for protecting data in transit. For remote desktop and remote
application access, the use of a virtual private network (VPN) system will
allow a remote device to access local resources as if it were directly con-
nected, but using an encrypted tunnel for data interchange.
Kill Pills
No matter how careful they are, users will occasionally misplace a mobile
device or have it stolen. Encryption standards and policies will help to
protect data, but they may still provide a conduit for e-mail and other
data. Use of protective measures such as a remote data wipe option (some-
times called a “kill pill”) can aid in rendering the lost device useless for
ongoing data exposure. Systems such as Microsoft's Exchange collabora-
tion platform include an example of a remote wipe service, allowing an
administrator to trigger a mobile device's e-mail client to wipe the device
when it next communicates with the server. This is highly useful in cases
of theft, loss, or forced termination of an employee, but it can result in
total loss of all data on the device, depending on the types of remote-wipe
options available.
Device Interaction
Because wireless transmissions can overlap with similar broadcasts, users
may find that interference between devices can affect mobile access.
High-density areas such as office buildings can be particularly trouble-
some, because broadcasts from nearby offices or other floors may block
access to an organization's own wireless nodes. Figure 9.5 illustrates the
sheer number of devices found within a small residential neighborhood
near my office, where more than 500 nodes were immediately identifiable
by simply driving through the area.
It is important to perform a site survey of your organizational facil-
ity before attempting to add wireless connectivity, to ensure that device
interaction is minimized and broadcast channel selection is optimized
Search WWH ::




Custom Search