Compaq d530 - Convertible Minitower Desktop PC Manual
Compaq d530 - Convertible Minitower Desktop PC Manual

Compaq d530 - Convertible Minitower Desktop PC Manual

Wireless security
Hide thumbs Also See for d530 - Convertible Minitower Desktop PC:

Advertisement

Quick Links

Wireless Security
Executive Summary .............................................................................................................................. 2
Problem Statement ............................................................................................................................... 2
Historical information/background..................................................................................................... 2
Mobile Device Security and HP Protect Tools........................................................................................... 3
Wired Equivalent Privacy...................................................................................................................... 4
Wi-Fi Protected Access ......................................................................................................................... 5
WPA Pre-Shared Key........................................................................................................................ 6
IEEE 802.11i ...................................................................................................................................... 6
Emerging Mobile Applications .............................................................................................................. 7
Virtual Private Network vs. Reverse Proxy ............................................................................................... 8
Conclusion.......................................................................................................................................... 9
For more information.......................................................................................................................... 10
1

Advertisement

Table of Contents
loading

Summary of Contents for Compaq d530 - Convertible Minitower Desktop PC

  • Page 1: Table Of Contents

    Wireless Security Executive Summary ..........................2 Problem Statement ..........................2 Historical information/background..................... 2 Mobile Device Security and HP Protect Tools................... 3 Wired Equivalent Privacy........................4 Wi-Fi Protected Access ......................... 5 WPA Pre-Shared Key........................6 IEEE 802.11i ............................6 Emerging Mobile Applications ......................7 Virtual Private Network vs.
  • Page 2: Executive Summary

    Executive Summary Today’s mobile workforce increasingly demands convenient and secure access to the Internet using mobile devices (such as notebook and handheld PCs) with HP Wi-Fi and other mobile connectivity solutions. A secure solution enables a mobile worker to gain safe network access in areas where it is traditionally hard to deploy "wired"...
  • Page 3: Mobile Device Security And Hp Protect Tools

    Mobile Device Security and HP Protect Tools HP saw the need for better security solutions very early, and started devoting resources to addressing this issue. As a result of this proactive effort, HP has developed a solution – the HP ProtectTools Security Manager –...
  • Page 4: Wired Equivalent Privacy

    Wired Equivalent Privacy Although most wireless security concerns have little or nothing to do with the wireless nature of the devices, there is some validity to the apprehension regarding the vulnerabilities of the Wired Equivalent Privacy key. WEP is an encryption algorithm designed to provide wireless security for 802.11 wireless networks.
  • Page 5: Wi-Fi Protected Access

    Vendor Solutions for WEP Vulnerability Other security measures Hiding the Service Set Identifier (SSID) is not a valid security measure. Because management frames on 802.11 Wireless LANs are always sent in the clear, this mode of Hiding the SSID operation does not provide adequate security Limiting the RF propagation Limiting propagation is hard, although it is possible in certain environments Wi-Fi Protected Access...
  • Page 6: Wpa Pre-Shared Key

    The following screen shots show available WPA authentication and encryption supported on HP notebook PCs. WPA Pre-Shared Key While WPA and 802.11i allow EAP Authentication, this solution may not be affordable or available for home users. In addition, home users don’t typically have access to an authentication server.
  • Page 7: Emerging Mobile Applications

    EAP and many other EAP implementations. For more details please visit http://www.hp.com/products/security Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 In addition to the advantages of WPA, 802.11i has the following advantages and issues: Advantages Issues •...
  • Page 8: Virtual Private Network Vs. Reverse Proxy

    Virtual Private Network vs. Reverse Proxy Most people are using Virtual Private Network (commonly known as Tunnels) to connect to their corporate networks. Even consumer-grade wireless and wired routers have VPN and some Firewall and DMZ capabilities. An alternative to VPN that is rapidly gaining acceptance is the use of reverse proxy to obtain pervasive access.
  • Page 9: Conclusion

    Conclusion A high-level understanding of the issues associated with wireless security is key to protecting your data and network. This is true of any kind of connection – wire-line or wireless. Over the past eight years, wireless security has undergone major changes to address the vulnerabilities in Wired Equivalent Privacy.
  • Page 10: For More Information

    Now and into the foreseeable future, mobile consumers and users can feel safer in implementing wireless solutions by remembering that standards-based wireless network security plus HP ProtectTools security technology equals a more secure mobile computing environment. For more information http://www.hp.com/products/security ©...

Table of Contents