SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Wireless Security on Context (disponible en español)
Posted by Jorge Guzman Olaya on Apr 15, 2013 10:02:25 AM


Why Security?

It all started with an email account you accessed through your laptop, and now sometimes it is really hard to track all
the digital profiles you own, plus we tend to pay little attention about accessing our digital assets in secure “wireless
domains”, these factors combined form a scenario where security breaches can really hurt your digital self as it
exists. It is clear that wireless communications has allowed us to adopt technology in a new way; we can use digital
tools without being tied to a location, but the fact is that when you use technology everywhere you are exposing
yourself to that “everywhere”. Popularity of wireless technology has shifted the usage of digital tools, your mobile
device is amazingly powerful and networks are growing in complexity to cope with better services. All this power
makes it difficult on the user to keep a track of the myriad of vulnerabilities and possible security exploits.




As mentioned above we have in our hands a complex scenario; from one side we have an exponential growth and
success of the wireless technology plus an increasing exposure of personal sensitive data to the digital world plus
more physical spaces where we can use the technology that at the same time increases the number of personal and
social contexts involved in our interactions with technology. On the other side we have a user that is still adapting to
the rapid shift, possibly meaning that he is less conscious of how various factors come together to form the service,
and it is how we find the first weak link in the chain; the lack of knowledge. Another factor is the fierce competition
among industry stakeholders; they are working isolated pushing their own agendas, creating a non -cohesive
framework of security for the wireless industry. On the contrary, threats and bad-intentioned people usually
beneficiate upon gathered knowledge of collaborative open communities through the Internet.

Taking Action to be More Secure

From the user perspective, the main action must be to increase knowledge of the technology. For example, where to
tune security configurations on the device or what information is being accessed on your device by the apps installed.
It is also important to know the risks of using a non-secure WLAN network. In the final part of this blog I summarize
various security tips you can find on the Internet and my personal recommendation.

Application developers must commit more responsibly to security and inform the customer about their efforts on the
matter, especially considering privacy of user sensitive information and its management; aspects like the length of
conservation of user information even after the user has uninstalled the app or the permissions of sh aring personal
information with third parties. Regarding the OS developers, it is expected that SW threats are addressed not only for
     the new releases of the product but also previous versions must be covered, and somehow frequency of security
     updates or patches must be increased.

     Other contributors to the industry take action: like national government’s initiative to extend EIR databases beyond
     countries frontiers to discourage device theft, or the effort countries are making, to oblige Internet giants to comply
     with international policies of user’s personal data handling. Academia presents innovative testing techniques against
     security breaches including fuzzy logic and genetic algorithms to simulate real life environments. New wireless
     applications like NFC and M2M also pose big questions and challenges to the industry that are being addressed;
     solutions like data encryption while being transferred or stored are being integrated into architectures and regulations,
     but the main path the industry must take is an improvement of the vision about security. Seurity threats cannot be
     avoided - they can only be managed and management must start with a plan to achieve a clear goal.

     A Framework to Achieve a More Secure Wireless Ecosystem

     If security threats can only be managed at the most, then, a base framework can be formulated to then build a plan or
     strategy to efficiently manage wireless security. CTIA has made a pretty good effort formulating such a framework in
     which the elements are:

    Consumers
    MNO
    Device Manufacturers
    Application Market Places
    Operating System vendors
    Chipset Manufacturers
    Network Services Systems
    Support SW Vendors
    VAS Service Providers
    Network Equipment Manufacturers

     Under its view CTIA proposes five cornerstones, around which security actions are executed and efforts should be
     built around:

1.   Consumers: Responsible to protect their devices through better configuration and installing applications to secure
     their devices and their data, also keeping that SW Up-to-date., Ffinally the users must be aware of what they put in
     their devices and what they disclosed on their social profiles.
2.   Devices: Comprises all the tools and methods that the industry and you as user, can use to minimize risks from
     security threats, given the high complexity of current devices and the great deal of information and activities we do
     with them.
3.   Network based security policies: Includes all the tools that network providers should use as countermeasures against
     security threats;, examples like Policy Routing Traffic Analysis, Service provider SSL VPN, and MDM (Mobile Device
     Management) capabilities for BYOD environments.
4.   Authentication control: Covers the authentication methods of the device with the network and those for the user to
     access the device, considering the multifactor method trend and the biometric approaches.
5.   Cloud, Networks and Services: Comprehends the whole extend of the network, its functional entities and the
     services that each part provides both for regular customers and enterprise users. Also the different precautions and
     plans that the network has to have in place for Disaster recovery scenarios and security schemes that ensure privacy
     and integrity of stored user information.
My Personal View on Wireless Security




                                     Image courtesy of Paola Buelvas (papolareina@yahoo.es)

    As mentioned above, a framework is only useful if there is some intention to develop something around that baseline,
    and in the introduction of this post I mentioned that industry main stakeholders tend to work isolated in a non -
    collaborative way, so I agree with some proposals about a push towards a multisource intelligence environment. In
    order to accomplish such an environment a Multisource Intelligent System could be the center tool to allow a
    collaborative effort of this kind. And so, the industry will have a transnational, multivendor, multi -technology tool,
    containing well documented security threats, problem workarounds, countermeasures and possible patches and
    solutions against known security breaches; all this following the best of the bread practices in IT management to
    organize, produce, control and store the flow of information that comes from solving engineering problems related to
    security in the wireless industry.

    This multi-collaborative industry repository will be accessible to all accredited members of the wireless industry and/or
    active contributors of security assets construction within the ecosystem. They will feed, maintain and update the
    content of this tool. Through the use of guidelines contained in international bodies of knowledge for IT handling, it
    will be possible to ensure the appropriate privacy for each industry stakeholder regarding industrial secret
    information, while still helping the development of solutions from already known threats and those foreseen by
    academia. The main objectives for an endeavor of this kind would be:

   Provide the industry with a construct around which industry stakeholders can produce collaborative efforts to better
    countermeasure security threats.
   To speed the production and divulgation processes of effective and more complete security countermeasures that
    better protect the customer and the industry, taking advantage of already documented knowledge, avoiding re -work
    and misinformation.

    Finally, I think that future technologies, like Context Aware networks can help to create a more secure environment
    for the user, allowing the execution of a counter action at the precise instant of technology usage and at the precise
    moment where a security threat becomes obvious, and without the need for the user to know or be prepared to all
    existent risks of his ongoing wireless transaction or service at a random space and time combination. All while at the
    same time optimizing the resources of the network devoted to protect the user against threats .; Ffor example, if the
    network detects that certain user is connecting through its own VPN client, a network base VPN solution flow can be
    allocated for another user.

    A Look into the Future of Wireless Security

    Fields for further study: BSN and BAN give security a totally new meaning, because this technology puts information
    concerning your own body into networks that today, cannot be considered totally secured;, so if this field of the
    industry is set for any success then security must be further developed and strengthen. Now MTC (Machine Type
    Communications) where human intervention is not required also needs an intelligent non supervised scheme that can
    ensure the basics of a secure communication network: Confidentiality, Integrity, Authentication, Non Repudiation,
    Access Control, Availability and Privacy.
Security future concepts: like beneficial viruses, SW that in the same line of DRM remain inactive but when found in
     unauthorized digital environments then proceed to delete themselves and the information attached to them. Another
     concept is the Active sentinel SW that contrary to a regular antivirus this SW adapts to a certain extent to identify the
     threat even if is not specified in the database but that follows a suspicious activity pattern against predefine rules.
     New biometric authentication methods like brain wave authentication that is really unique and fast.

     Summarized Tips for the Wireless User

     As promised, here is a list of “do's” and “don'ts” for the user of wireless technology.

    Do:
1.  Be informed and cautious while downloading apps, clicking links, providing information to online sites, setting
    passwords, and linking accounts and online profiles. Always consider installing security software on your wireless
    device.
2. Check the permissions of each installed app, and take the time to read the permissions you give to apps while
    installing them.
3. Be conscious when using Wi-Fi, check the type of security used, if security is absent from the access point or lower
    than WPA2, avoid logging in your sensitive accounts, or do banking transactions, without a VPN client solution, if you
    don’t have such solution, restrict your session to just browsing if at all.
4. Be proactive and organized with your passwords: set a strategy to generate, change and store them, there are plenty
    of passwords apps.
5. Check the details of your wireless bill to identify unauthorized usage or suspicious usage patterns from your devices.
6. Update your trusted applications and OS in all the devices you run digital transactions.
7. Report stolen or lost phones.
8. Use a VPN solution for unsecure Wi-Fi
9. Use complex passwords for important accounts.
10. Set security questions that really help you protect your data.
11. Use encryption of your sensitive data while stored on mobile devices, available apps can be found on your preferred
    SW provider online stores.

     Do Not:
1.   Publish personal information or specific information about your wireless devices (phone number, IMEI, MAC address,
     etc.)
2.   Root your phone or mobile device for personalization purposes.
3.   Buy an stolen phone or buy it from a suspicious provider
4.   Download apps from un-authorized stores different from the OS manufacturer store, like directly from the internet.
5.   Be lazy, when setting passwords, logging into sensitive accounts, exchanging banking info, and protecting mobile
     devices, always use what you consider is more secure for your digital asset, even if it takes more time.
6.   Have one factor authentication for sensitive accounts or digital profiles.
7.   Have the same password across multiple online or digital profiles.
8.   Thrust blindly on third parties to secure your digital data, take your own measures, backup regularly, encrypt your
     data, do not use unsecure access points can be just some examples.
9.   Link social accounts all together if unnecessary, you’ll be providing a great deal of information without noticing it.

     For more, follow me on Twitter @jomaguo

     Read this blog post in Spanish.
     For all blog posts written by Jorge Guzman Olaya, please visit his Community Profile.




                          For more discussions and topics around SP Mobility, please visit our Mobility
                                      Community:http://cisco.com/go/mobilitycommunity

Weitere ähnliche Inhalte

Was ist angesagt?

76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Deepak Mishra
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsMercury Solutions Limited
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...Ivanti
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 

Was ist angesagt? (20)

Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
Information security.pptx
Information security.pptxInformation security.pptx
Information security.pptx
 
76 s201918
76 s20191876 s201918
76 s201918
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
188
188188
188
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...Report: Study and Implementation of Advance Intrusion Detection and Preventio...
Report: Study and Implementation of Advance Intrusion Detection and Preventio...
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
6 Defence-In-Depth Security Tactics as Recommended by the National Cyber Secu...
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 

Ähnlich wie Wireless Security on Context (disponible en español)

I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guideAndy Kwong
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsKavita Rastogi
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economyaccenture
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAAharon Aharon
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 

Ähnlich wie Wireless Security on Context (disponible en español) (20)

I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Firewall buyers-guide
Firewall buyers-guideFirewall buyers-guide
Firewall buyers-guide
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
A survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systemsA survey study of title security and privacy in mobile systems
A survey study of title security and privacy in mobile systems
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 

Mehr von Cisco Service Provider Mobility

Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)Cisco Service Provider Mobility
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...Cisco Service Provider Mobility
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperCisco Service Provider Mobility
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Cisco Service Provider Mobility
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Cisco Service Provider Mobility
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)Cisco Service Provider Mobility
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Cisco Service Provider Mobility
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Cisco Service Provider Mobility
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica Cisco Service Provider Mobility
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Cisco Service Provider Mobility
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptCisco Service Provider Mobility
 

Mehr von Cisco Service Provider Mobility (20)

Cisco quantum policy suite
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suite
 
Cisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based Advertising
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
 
SP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought LeadershipSP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought Leadership
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
 

Kürzlich hochgeladen

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

Wireless Security on Context (disponible en español)

  • 1. Wireless Security on Context (disponible en español) Posted by Jorge Guzman Olaya on Apr 15, 2013 10:02:25 AM Why Security? It all started with an email account you accessed through your laptop, and now sometimes it is really hard to track all the digital profiles you own, plus we tend to pay little attention about accessing our digital assets in secure “wireless domains”, these factors combined form a scenario where security breaches can really hurt your digital self as it exists. It is clear that wireless communications has allowed us to adopt technology in a new way; we can use digital tools without being tied to a location, but the fact is that when you use technology everywhere you are exposing yourself to that “everywhere”. Popularity of wireless technology has shifted the usage of digital tools, your mobile device is amazingly powerful and networks are growing in complexity to cope with better services. All this power makes it difficult on the user to keep a track of the myriad of vulnerabilities and possible security exploits. As mentioned above we have in our hands a complex scenario; from one side we have an exponential growth and success of the wireless technology plus an increasing exposure of personal sensitive data to the digital world plus more physical spaces where we can use the technology that at the same time increases the number of personal and social contexts involved in our interactions with technology. On the other side we have a user that is still adapting to the rapid shift, possibly meaning that he is less conscious of how various factors come together to form the service, and it is how we find the first weak link in the chain; the lack of knowledge. Another factor is the fierce competition among industry stakeholders; they are working isolated pushing their own agendas, creating a non -cohesive framework of security for the wireless industry. On the contrary, threats and bad-intentioned people usually beneficiate upon gathered knowledge of collaborative open communities through the Internet. Taking Action to be More Secure From the user perspective, the main action must be to increase knowledge of the technology. For example, where to tune security configurations on the device or what information is being accessed on your device by the apps installed. It is also important to know the risks of using a non-secure WLAN network. In the final part of this blog I summarize various security tips you can find on the Internet and my personal recommendation. Application developers must commit more responsibly to security and inform the customer about their efforts on the matter, especially considering privacy of user sensitive information and its management; aspects like the length of conservation of user information even after the user has uninstalled the app or the permissions of sh aring personal
  • 2. information with third parties. Regarding the OS developers, it is expected that SW threats are addressed not only for the new releases of the product but also previous versions must be covered, and somehow frequency of security updates or patches must be increased. Other contributors to the industry take action: like national government’s initiative to extend EIR databases beyond countries frontiers to discourage device theft, or the effort countries are making, to oblige Internet giants to comply with international policies of user’s personal data handling. Academia presents innovative testing techniques against security breaches including fuzzy logic and genetic algorithms to simulate real life environments. New wireless applications like NFC and M2M also pose big questions and challenges to the industry that are being addressed; solutions like data encryption while being transferred or stored are being integrated into architectures and regulations, but the main path the industry must take is an improvement of the vision about security. Seurity threats cannot be avoided - they can only be managed and management must start with a plan to achieve a clear goal. A Framework to Achieve a More Secure Wireless Ecosystem If security threats can only be managed at the most, then, a base framework can be formulated to then build a plan or strategy to efficiently manage wireless security. CTIA has made a pretty good effort formulating such a framework in which the elements are:  Consumers  MNO  Device Manufacturers  Application Market Places  Operating System vendors  Chipset Manufacturers  Network Services Systems  Support SW Vendors  VAS Service Providers  Network Equipment Manufacturers Under its view CTIA proposes five cornerstones, around which security actions are executed and efforts should be built around: 1. Consumers: Responsible to protect their devices through better configuration and installing applications to secure their devices and their data, also keeping that SW Up-to-date., Ffinally the users must be aware of what they put in their devices and what they disclosed on their social profiles. 2. Devices: Comprises all the tools and methods that the industry and you as user, can use to minimize risks from security threats, given the high complexity of current devices and the great deal of information and activities we do with them. 3. Network based security policies: Includes all the tools that network providers should use as countermeasures against security threats;, examples like Policy Routing Traffic Analysis, Service provider SSL VPN, and MDM (Mobile Device Management) capabilities for BYOD environments. 4. Authentication control: Covers the authentication methods of the device with the network and those for the user to access the device, considering the multifactor method trend and the biometric approaches. 5. Cloud, Networks and Services: Comprehends the whole extend of the network, its functional entities and the services that each part provides both for regular customers and enterprise users. Also the different precautions and plans that the network has to have in place for Disaster recovery scenarios and security schemes that ensure privacy and integrity of stored user information.
  • 3. My Personal View on Wireless Security Image courtesy of Paola Buelvas (papolareina@yahoo.es) As mentioned above, a framework is only useful if there is some intention to develop something around that baseline, and in the introduction of this post I mentioned that industry main stakeholders tend to work isolated in a non - collaborative way, so I agree with some proposals about a push towards a multisource intelligence environment. In order to accomplish such an environment a Multisource Intelligent System could be the center tool to allow a collaborative effort of this kind. And so, the industry will have a transnational, multivendor, multi -technology tool, containing well documented security threats, problem workarounds, countermeasures and possible patches and solutions against known security breaches; all this following the best of the bread practices in IT management to organize, produce, control and store the flow of information that comes from solving engineering problems related to security in the wireless industry. This multi-collaborative industry repository will be accessible to all accredited members of the wireless industry and/or active contributors of security assets construction within the ecosystem. They will feed, maintain and update the content of this tool. Through the use of guidelines contained in international bodies of knowledge for IT handling, it will be possible to ensure the appropriate privacy for each industry stakeholder regarding industrial secret information, while still helping the development of solutions from already known threats and those foreseen by academia. The main objectives for an endeavor of this kind would be:  Provide the industry with a construct around which industry stakeholders can produce collaborative efforts to better countermeasure security threats.  To speed the production and divulgation processes of effective and more complete security countermeasures that better protect the customer and the industry, taking advantage of already documented knowledge, avoiding re -work and misinformation. Finally, I think that future technologies, like Context Aware networks can help to create a more secure environment for the user, allowing the execution of a counter action at the precise instant of technology usage and at the precise moment where a security threat becomes obvious, and without the need for the user to know or be prepared to all existent risks of his ongoing wireless transaction or service at a random space and time combination. All while at the same time optimizing the resources of the network devoted to protect the user against threats .; Ffor example, if the network detects that certain user is connecting through its own VPN client, a network base VPN solution flow can be allocated for another user. A Look into the Future of Wireless Security Fields for further study: BSN and BAN give security a totally new meaning, because this technology puts information concerning your own body into networks that today, cannot be considered totally secured;, so if this field of the industry is set for any success then security must be further developed and strengthen. Now MTC (Machine Type Communications) where human intervention is not required also needs an intelligent non supervised scheme that can ensure the basics of a secure communication network: Confidentiality, Integrity, Authentication, Non Repudiation, Access Control, Availability and Privacy.
  • 4. Security future concepts: like beneficial viruses, SW that in the same line of DRM remain inactive but when found in unauthorized digital environments then proceed to delete themselves and the information attached to them. Another concept is the Active sentinel SW that contrary to a regular antivirus this SW adapts to a certain extent to identify the threat even if is not specified in the database but that follows a suspicious activity pattern against predefine rules. New biometric authentication methods like brain wave authentication that is really unique and fast. Summarized Tips for the Wireless User As promised, here is a list of “do's” and “don'ts” for the user of wireless technology. Do: 1. Be informed and cautious while downloading apps, clicking links, providing information to online sites, setting passwords, and linking accounts and online profiles. Always consider installing security software on your wireless device. 2. Check the permissions of each installed app, and take the time to read the permissions you give to apps while installing them. 3. Be conscious when using Wi-Fi, check the type of security used, if security is absent from the access point or lower than WPA2, avoid logging in your sensitive accounts, or do banking transactions, without a VPN client solution, if you don’t have such solution, restrict your session to just browsing if at all. 4. Be proactive and organized with your passwords: set a strategy to generate, change and store them, there are plenty of passwords apps. 5. Check the details of your wireless bill to identify unauthorized usage or suspicious usage patterns from your devices. 6. Update your trusted applications and OS in all the devices you run digital transactions. 7. Report stolen or lost phones. 8. Use a VPN solution for unsecure Wi-Fi 9. Use complex passwords for important accounts. 10. Set security questions that really help you protect your data. 11. Use encryption of your sensitive data while stored on mobile devices, available apps can be found on your preferred SW provider online stores. Do Not: 1. Publish personal information or specific information about your wireless devices (phone number, IMEI, MAC address, etc.) 2. Root your phone or mobile device for personalization purposes. 3. Buy an stolen phone or buy it from a suspicious provider 4. Download apps from un-authorized stores different from the OS manufacturer store, like directly from the internet. 5. Be lazy, when setting passwords, logging into sensitive accounts, exchanging banking info, and protecting mobile devices, always use what you consider is more secure for your digital asset, even if it takes more time. 6. Have one factor authentication for sensitive accounts or digital profiles. 7. Have the same password across multiple online or digital profiles. 8. Thrust blindly on third parties to secure your digital data, take your own measures, backup regularly, encrypt your data, do not use unsecure access points can be just some examples. 9. Link social accounts all together if unnecessary, you’ll be providing a great deal of information without noticing it. For more, follow me on Twitter @jomaguo Read this blog post in Spanish. For all blog posts written by Jorge Guzman Olaya, please visit his Community Profile. For more discussions and topics around SP Mobility, please visit our Mobility Community:http://cisco.com/go/mobilitycommunity