Search This Blog

Thursday, February 19, 2009

Guidelines for securing IEEE 802.11i wireless networks

NIST document provides a guide to IEEE 802.11i
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Spotlight Story
Guidelines for securing IEEE 802.11i wireless networks

M. E. Kabay By M. E. Kabay
A useful free document, one not requiring registration and having 162 pages, is "Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i," which is Special Publication 800-97 from the National Institute of Standards and Technology. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

The Habit: or There and Back Again to the NISTy Mountains Like Bilbo Baggins of Bag End, Hobbiton, whose story "There and Back Again" I have read and reread with pleasure over five decades, I find myself returning many times to favorite haunts such as the NIST list of Special Publications to see how my old friends are doing with their books of wisdom and dragon-slaying lore.

Accused rogue admin Terry Childs makes his case He's been in jail for seven months now, but former San Francisco network administrator Terry Childs says he's going to keep fighting to prove he's innocent of computer crime charges.

Hackers break into gov't travel site, feed users attack code A travel reservations Web site used by several federal agencies was hacked last week, and shunted unsuspecting users to a malicious domain, according to information Computerworld has obtained.

Security Vendor Breaches: Fallout Justified Attendees at last week's ShmooCon security conference were transfixed when news broke that a hacker breached part of Kaspersky Lab's U.S. support site by exploiting a flaw in the site's programming.

3 Ways Twitter Security Falls Short The popular micro-blogging platform Twitter continues its explosive growth. Twitter experienced a 900 percent increase in active users in the last year, according to a recent blog post from Biz Stone, the company's co-founder. People are increasingly using it to get breaking news updates, to collaborate with colleagues remotely, and connect with friends on an up-to-the-minute basis. Some businesses are using it as a new promotion and marketing tool.

Cisco, Trend Micro put security in home routers Cisco Systems is building a Trend Micro Internet security service into some home Wi-Fi routers to help protect families and small businesses from fraud, phishing and predators.

February giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: One American Express gift card worth $250 from Global Knowledge; One Microsoft training course worth $2,995 from Global Knowledge; 15 copies each of the hot book titles Voice over IP Security, and CCNA Wireless Official Exam Certification Guide and 15 copies of Exchange Server 2007 How-To: Real Solutions for Exchange Server 2007 SP1 Administrators. Get all the entry details here.


IT & social networks
where IT pros do their social networkingSurvey takes a look at where IT pros do their social networking.

Hot spot safety tips
Top 10 hot spot safety tipsHow to protect laptop data at your local Wi-Fi hot spot.

Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies. Review this research today.

rule

Avoid the SMB Technology Quagmire
SMBs have concrete technology needs, but it's difficult to find cost-effective, easy to manage and secure solutions. Get real-world advice on how to complete this task in this Special Briefing, "Avoiding Techno-quicksand for Small and Medium Businesses." Find out how to select the right products for your organization today.
Download this Special Briefing now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

02/19/09

Today's most-read stories:

  1. Nortel exec issues vague promise to detail its reorganization
  2. 9 dirty tricks: Social engineers' favorite pick-up lines
  3. Social network sites vary greatly on availability
  4. SolarWinds offers free Cisco IP SLA monitoring tool
  5. Vodafone to sell second HTC Google phone
  6. How to build your own supercomputer
  7. Spammers break Hotmail's CAPTCHA yet again
  8. Microsoft strives for mobile mindshare with Windows Mobile 6.5
  9. Is Cisco short of cash in the U.S.?
  10. LiMo's Linux-based mobile OS stack makes gains


Product Guides
Get side-by-side product comparisons, buying tips, market trend information, case studies and more with Network World's Patch Management Product Guide.
Visit now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: