Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Security and Enter Price

Security and Enter Price

Ratings: (0)|Views: 2|Likes:
Published by rajunair

More info:

Published by: rajunair on Mar 26, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/10/2014

pdf

text

original

 
 
Wireless Data Shot: Security and the Enterprise
What is the main barrier to wireless security adoption? What kinds of wireless security would other developers be most likely to use? What is being used in the enterprise? Find out how your colleagues answered these questions in a recent survey by Evans Data Corp.
October 14, 2004
he Evans Wireless Development Survey is adetailed report of extensive, in-depth interviewswith almost 500 developers active in wirelessapplication or infrastructure development. It wasconducted in the Fall of 2004. All text andanalysis herein provided by Evans Data.
Barriers of Adoption: Security
 When wireless developers were asked theiropinion on whether or not security was a someform of barrier to widespread adoption of mobiledevices and services, 85 percent felt that it was.Evans Data respectfully disagrees with thisopinion, theorizing that the vast majority ofconsumers care more about the "gee-whiz" factorof their wireless devices than security.The main problem with wireless networks is that most areunprotected. The simple fact is that 70 percent of wi-fi networks don'tmake use of such readily available security offerings like WEP.Those exposed networks are easily exploited by the unscrupulous.The average user is extremely pleased if they can get devices frommultiple vendors working at all, let alone securely. If the widespreadconsumer base was concerned about security, the current plagues ofemail "virii" that are dependant on opening attachments simply wouldnot be possible.
The Type of Security Mechanism that Will Be the Most Common
 Currently, there is no clear technology leader in the mobile andwireless space with regard to the security mechanism developerschoose when building applications. Additionally, unless a developerspecializes in security, there can be definite overlap in their selection. For example, choosing PKI does notrule out the usage of SSL, digital signatures, and data encryption mechanisms.
Figure 1.The Barriers:
This graph shows howmany developers thought that security was asome form of barrier to widespread adoption ofmobile devices and services.
 
Figure 2.The Question:
For mobiledevices/services, what is your perceptionof the following barriers of adoption?
Figure 3.Most Common SecurityMechanism:
This graph shows the typeof security mechanism that will be themost common.
 
Page 1of 3Wireless Data Shot: Security and the Enterprise11-Dec-07http://www.devx.com/wireless/Article/22160/1763/page/1
 
They are all interrelated and supportive of each other. SSL relies ondigitally signed certificates provided by a trusted third-party PKIcertifying authority, which enables encrypted data channels andallows for safe user authentication for Web login scenarios.PKI ranks first in usage by 15 percent of wireless developerssurveyed, followed shortly by SSL/TLS. When the two options arecombined, PKI/SSL solutions are selected by just under a third of alldevelopers surveyed. Vying for third-place, userauthentication/password protection, WAP 2.0 security, and digitalsignatures are each selected by one out of 10 respondents.On the next page, we'll look beyond speculation and find out whatsecurity mechanisms developers are actually *using* in theirenterprises.
Page 1 of 2 
 
Figure 4.The Question:
Which of thefollowing security mechanisms would yoube
most 
likely to use on your wirelessapps?
 
Navigating Your IT Career
 A career in information technology usually has its share of ups anddowns. Download this Internet.com eBook to learn where the jobs arein IT, how to negotiate a salary, and helpful advice on job security andhow to deal with a layoff.
»
 
Locking Down Your Wireless Network
Changing the default SSID or disabling SSID broadcasting are two ofthe most popular ways to help secure a wireless network, but by nomeans do they provide adequate security. Learn how to useencryption, VPNs, and basic laptop and PC security to keep yournetwork and machines safe.
»
 
Evaluating Software as a Service for Your Business
 Is Software as a Service just hype, or is something really going onhere? And if there is fuel behind these flames, what's different? Whyhas a model that languished for a decade suddenly gained steam?Download this eBook to see if your company can benefit as SaaS triesto change the face of the enterprise.
»
 
The State of Storage Virtualization
Virtualization has been something of a buzzword in storage for morethan half a decade. It is defined in a variety of ways, depending onwhom you ask. So what exactly is it? And how should it beimplemented? This eBook from our editors atEnterpriseStorageForum.com and Internet.com explores some of thesecond-generation storage virtualization products from a number ofvendors and compares their approaches.
»
 
Waging the War Against Spam
 Businesses spend a whopping $712 per worker, per year, in the battleagainst spam, but there doesn't seem to be any easy answers to theproblem. Download this eBook to see what your IT department can doto reduce the nuisance of spam, and for tips on how your users canhelp you fight the battle.
»
 
Page 2of 3Wireless Data Shot: Security and the Enterprise11-Dec-07http://www.devx.com/wireless/Article/22160/1763/page/1

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->