Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×

Comment Re:I can think of a few (Score 1) 496

Except almost no one implements "hardened wired connections". Do you run crypto on your wired network? Do you require 802.1x auth on your wired network? Do you you encase all the cabling in pressure-alarmed conduit? Do you perform Functional Compartmentalization where network access is limited on a per-user basis? Almost no one does these things - most of them are non-trivial to do with wired networks. All I have to do is pay a janitor a few bucks to plug something into a wired port and bingo, I have full network access.

Wireless on the other hand has auth and crypto built in so while sniffing is trivial, if you're running 802.11i it doesn't matter. If you're worried about what happens when it reaches the AP, some wireless vendors keep the traffic encrypted all the way back to a controller in the Data Center. There are no crypto keys or user data on the AP so if someone were to steal it or gain access to the cable behind it they would only get encrypted data. Then add in some vendor's built-in ICSA firewall and you can easily perform Functional Compartmentalization on a per-user basis regardless of user location.

The wireless world has moved on from the old WEP days regarding security. There is still the jamming DoS attack vulnerabilities but many people have mitigated or just accepted them in exchange for the huge productivity gains and cost savings.

Slashdot Top Deals

Too much of everything is just enough. -- Bob Wier