Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:18 AM

Is Wireless Really Worth It?

Wireless technology may be convenient, but it also introduces significant hassles - and risks

Wireless networks are ubiquitous these days. We are all, for better or worse, being bombarded by radio waves in all sorts of frequency ranges, and if we could put a 2.4GHz monitor in our heads, we’d be overloaded by the sheer volume of traffic screaming around on wireless networks using that frequency.

Despite the phenomenal security and reliability issues with it, users ranging from my parents to Fortune 100 companies are using it. What has driven the move from wired Ethernet to WiFi?

Clearly, convenience is part of it. Outside the enterprise, there is no doubt that this convenience is worth it, at least from my standpoint. Recently, I relocated from Cambodia to Santiago, Chile, where things such as acquiring Internet service can take weeks. Many businesses here provide free WiFi to customers, providing a valuable service for many and giving themselves a competitive advantage. I don’t really want to think about how much time I have spent at Starbucks for their magic combo – caffeine, no smoking, and free WiFi.

In the home, the case gets weaker. While staying in a temporary apartment during my move, I could see roughly 15 networks at any given time, of varying signal strength. Almost all of those were protected with either WEP or WAP, and I have to confess that I was sorely tempted to just “borrow” one of those connections with the help of Airsnort and friends.

Now that I've moved to a house, I only have two networks visible, one for each neighbor. Again, they are protected networks. But how many places do those people really use their computers? Is it worth it to them to deal with the hassle of setup, the knowledge that the wireless router will crash, and the interference with cordless phones and other wireless devices in the home?

Mache Creeger did a piece on this in ACM Queue, and I have to confess that I was nearly convinced. "Nearly" because I move so much and seldom live someplace that I own. If I had a more permanent home, I would certainly think twice about the utility of wireless versus a proper wired infrastructure.

Inside the enterprise, the case for wireless is even less clear. For the legitimate user, it's fantastic to be able to open a laptop anywhere in a building and know that, given the proper password, full access to the network will be available within seconds. No more worries about how many network drops a conference room has or how many people will need access, and no more cables draped over the edges of tables and running to the walls.

But what are the costs? Well, for one, managing a large wireless infrastructure is far from free, and the number of access points needed to provide good coverage throughout a large building is decidedly non-trivial. Then there will be dead zones and annoyed people that go along with them. “I can check my email in the bathroom!” is certainly not a phrase I long to hear in my life.

Add these to the security headaches of keeping synchronized encryption keys on all the devices, changing them regularly to limit the damage from compromise, trying to limit the network to the office’s perimeter, and adding the secondary access control mechanisms to prevent anyone with Airsnort from getting the run of the show, and the costs seem pretty high. The wireless network taxes not just the IT infrastructure, but the security group as well.

There are certainly products out there that provide reasonable control security for these networks, but it seems to me that the cost – both initial and ongoing – must be hard to justify. If you have experiences to share on either side of the wireless security argument, please post a reply to the message board attached to this column.

— Nathan Spande has implemented security in medical systems during the dotcom boom and bust and suffered through federal government security implementations. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.
PUBLISHED: 2019-10-16
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
PUBLISHED: 2019-10-16
A vulnerability in the CLI of Cisco TelePresence Collaboration Endpoint (CE) Software could allow an authenticated, local attacker to execute code with root privileges. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating as the re...
PUBLISHED: 2019-10-16
A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface. The vulnerability is due to insufficient...