Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

04:18 AM

Is Wireless Really Worth It?

Wireless technology may be convenient, but it also introduces significant hassles - and risks

Wireless networks are ubiquitous these days. We are all, for better or worse, being bombarded by radio waves in all sorts of frequency ranges, and if we could put a 2.4GHz monitor in our heads, we’d be overloaded by the sheer volume of traffic screaming around on wireless networks using that frequency.

Despite the phenomenal security and reliability issues with it, users ranging from my parents to Fortune 100 companies are using it. What has driven the move from wired Ethernet to WiFi?

Clearly, convenience is part of it. Outside the enterprise, there is no doubt that this convenience is worth it, at least from my standpoint. Recently, I relocated from Cambodia to Santiago, Chile, where things such as acquiring Internet service can take weeks. Many businesses here provide free WiFi to customers, providing a valuable service for many and giving themselves a competitive advantage. I don’t really want to think about how much time I have spent at Starbucks for their magic combo – caffeine, no smoking, and free WiFi.

In the home, the case gets weaker. While staying in a temporary apartment during my move, I could see roughly 15 networks at any given time, of varying signal strength. Almost all of those were protected with either WEP or WAP, and I have to confess that I was sorely tempted to just “borrow” one of those connections with the help of Airsnort and friends.

Now that I've moved to a house, I only have two networks visible, one for each neighbor. Again, they are protected networks. But how many places do those people really use their computers? Is it worth it to them to deal with the hassle of setup, the knowledge that the wireless router will crash, and the interference with cordless phones and other wireless devices in the home?

Mache Creeger did a piece on this in ACM Queue, and I have to confess that I was nearly convinced. "Nearly" because I move so much and seldom live someplace that I own. If I had a more permanent home, I would certainly think twice about the utility of wireless versus a proper wired infrastructure.

Inside the enterprise, the case for wireless is even less clear. For the legitimate user, it's fantastic to be able to open a laptop anywhere in a building and know that, given the proper password, full access to the network will be available within seconds. No more worries about how many network drops a conference room has or how many people will need access, and no more cables draped over the edges of tables and running to the walls.

But what are the costs? Well, for one, managing a large wireless infrastructure is far from free, and the number of access points needed to provide good coverage throughout a large building is decidedly non-trivial. Then there will be dead zones and annoyed people that go along with them. “I can check my email in the bathroom!” is certainly not a phrase I long to hear in my life.

Add these to the security headaches of keeping synchronized encryption keys on all the devices, changing them regularly to limit the damage from compromise, trying to limit the network to the office’s perimeter, and adding the secondary access control mechanisms to prevent anyone with Airsnort from getting the run of the show, and the costs seem pretty high. The wireless network taxes not just the IT infrastructure, but the security group as well.

There are certainly products out there that provide reasonable control security for these networks, but it seems to me that the cost – both initial and ongoing – must be hard to justify. If you have experiences to share on either side of the wireless security argument, please post a reply to the message board attached to this column.

— Nathan Spande has implemented security in medical systems during the dotcom boom and bust and suffered through federal government security implementations. Special to Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Leak Week: Billions of Sensitive Files Exposed Online
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
Intel Issues Fix for 'Plundervolt' SGX Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/11/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-14
There is an improper authentication vulnerability in Huawei smartphones (Y9, Honor 8X, Honor 9 Lite, Honor 9i, Y6 Pro). The applock does not perform a sufficient authentication in a rare condition. Successful exploit could allow the attacker to use the application locked by applock in an instant.
PUBLISHED: 2019-12-14
Some Huawei smart phones have a null pointer dereference vulnerability. An attacker crafts specific packets and sends to the affected product to exploit this vulnerability. Successful exploitation may cause the affected phone to be abnormal.
PUBLISHED: 2019-12-13
There is an information disclosure vulnerability in certain Huawei smartphones (Mate 10;Mate 10 Pro;Honor V10;Changxiang 7S;P-smart;Changxiang 8 Plus;Y9 2018;Honor 9 Lite;Honor 9i;Mate 9). The software does not properly handle certain information of applications locked by applock in a rare condition...
PUBLISHED: 2019-12-13
Huawei CloudUSM-EUA V600R006C10;V600R019C00 have an information leak vulnerability. Due to improper configuration, the attacker may cause information leak by successful exploitation.
PUBLISHED: 2019-12-13
Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have an out-of-bounds read vulnerability. An attacker who logs in to the board m...