Download presentation
Presentation is loading. Please wait.
Published byThomasina Hicks Modified over 9 years ago
1
Wireless Security: Protect yourself when you’re mobile
2
Wireless Security: It’s not Just for Laptops Wireless communication is convenient, and for the most part, available almost anywhere. Common types of wireless communication are Bluetooth, WiFi, and WiMax. Wireless security is not just for laptops: consider these wireless devices Cell phones Blackberry Devices PocketPC
3
Cellular Devices Cellular phones are not considered secure devices Traditionally do not contain options or features to increase security. Usually contain valuable information Phone numbers, contact information, calendar functions, photos, voice recording options, etc. Protect your cellular device from loss or damage Use whatever security features are possible, including locking your phone with a password or security code.
4
PDAs (Blackberries, PalmPilots, etc) Use password protection, if available. Be sure to use a strong password. Where possible, data transmissions from a PDA should be encrypted. Ethernet, Bluetooth, and other wireless access to the PDA should be disabled when not in use. Wireless access should be configured to request the user for confirmation before connecting to anything. Be cautious when opening any attachments, as they could include software harmful to your PDA.
5
Laptop Safety and Wireless Guidelines Password protect your laptop Follow a security checklist. An example can be found on the SecurePurdue website: http://www.purdue.edu/securepurdue/bestPractices/ mobileDevice.cfm Do not leave your laptop unattended, and be sure to store it in a secure location when not in use Wireless access should require user authentication before connecting to the computer Disable wireless access when not in use Only use secure wireless connections: a secure wireless connection has a padlock icon next to it
6
Before you connect… Only connect to secure wireless networks Secure networks will be noted with the gold lock icon Connect only to networks you know and trust Limit what sites you visit when using wireless networks Don’t access sensitive information on unsecured sites while traveling There may be “imposter” PAL (Purdue Air Link) 2.0 networks that are not secure, and are not Purdue networks. The non- Purdue 2.0 networks will exist outside/on the border of the area PAL 2.0 reaches
7
Resources Mobile Device Security Guidelines http://www.purdue.edu/securepurdue/bestPr actices/mobileDevice.cfm http://www.purdue.edu/securepurdue/bestPr actices/mobileDevice.cfm Security Checklist http://www.purdue.edu/securepurdue/docs/s ecurityChecklist.pdf http://www.purdue.edu/securepurdue/docs/s ecurityChecklist.pdf Security While Traveling http://www.purdue.edu/securepurdue/bestPr actices/traveling.cfm http://www.purdue.edu/securepurdue/bestPr actices/traveling.cfm
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.