Skip to main content

Defence In Depth: Preventing Going Hairless Over Wireless

Wireless networks are fast establishing themselves as a part of the information technology infrastructure. The security mechanisms have yet to provide adequate protection to the data passed by wireless systems and to the 'wired' systems to which they connect. Whilst encryption authentication and authorization are necessary elements in the security equation there are other techniques that can be used in defense. This paper discusses some techniques that utilize modifying radio wave behavior (directional antenna and low power transmissions) as a means to add depth to security. The paper also presents some options such as file compression and burst transmissions as considerations for reducing the probability of intercept.

169 (PDF, 1.87MB)

17 Apr 2002
ByJonathon Berry
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.