Access "Exposing and addressing wireless security concerns"
This article is part of the April 2003 issue of Unwrapping Windows Server 2003: An exclusive first look at Microsoft's new OS
They may be among the nation's "best and brightest," but the 700 students and 13,000 instructors, researchers, residents and interns at Harvard Medical School in Boston were creating a huge headache for its IT department. We recognized the need for security before we ever deployed wireless. Joe Bruno, Harvard Medical School Students, staff and faculty wanted to use wireless-enabled devices, be it to e-mail a friend on a lunch break or to download a journal article for a lecture. But nobody seemed to use the same platform or operating system. High turnover and a decentralized population made security that much tougher. Pass the aspirin, please. "This is a very demanding community. It's important we do the right things the right way," says Joe Bruno, associate dean for IT at the nation's No. 1 medical school. "That may sound like a simple statement, but, for sure, there's a lot involved in it." Bruno is far from alone. All over the country, college campuses, large and small, are building WLANs to meet staff and student demand and stay competitive. Students and... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
Microsoft promised Windows Server 2003 would be "secure by design, secure by default and secure in deployment." We took the wrapper off this new OS to see if it lives up to expectations.
-
Best practices for Windows 2003 migration
by Lawrence Walsh
Case study: Enterasys Networks shares the good and the bad on its Windows Server 2003 migration.
-
Exposing and addressing wireless security concerns
by Anne Saita
Campus IT managers' emphasis on wireless security puts them at the head of the class.
-
Keeping WLANs safe with WLAN security tools
by Lisa Phifer, Contributor
Check out a variety of seurity managers tools to help keep WLANs safe.
-
Computer threats gaining momentum in 2002, survey says
by Larry Bridwell and Lawrence Walsh
There were no global "virus disasters" in 2002. But the malware problem still got worse, according to the 8th annual ICSA Labs Virus Prevalence Survey.
-
VoIP security: Real-world VoIP implementation best practices
by Anne Saita
If you want VoIP security, the pros say do your homework and roll up your sleeves during VoIP implementations.
-
Examining Windows Server 2003 operating system security
by Randal Franklin Smith
-
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
Sidebar: Microsoft makes good on its promise to make Windows 2003 and IIS secure by default.
-
WLAN security: Best practices for wireless network security
by Lisa Phifer, Contributor
WEP and war drivers scaring you away? Try these new solutions and best practices to protect your wireless networks.
-
Checklist for secure wireless LAN deployment
by Lisa Phifer, Contributor
Lisa Phifer outlines a checklist for secure wireless LAN deployment in the areas of policy, integration planning, and deployment and beyond.
-
Merging firewalls: Making your enterprise more secure with Sidewinder
by Fred Avolio, Contributor
Review: Secure Computing creates an impressive product by merging two leading firewalls into the Sidewinder G2.
-
VoIP network security protocols: Is VoIP secure?
by Steven Taylor, Contributor
Is your network equal to the task? Are you willing to risk exposing data and voice on the Internet?
-
Windows 2003: IIS Web server security best practices
by Randal Franklin Smith, Contributor
-
Columns
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
In the wake of an incident, CISOs should make the most of the opportunity to increase information security budgets.
-
HIPAA 2003 deadline sparks rush toward compliance
by Anne Saita
With the HIPAA 2003 privacy rule deadline approaching, some health care organizations are speeding toward HIPAA compliance; others hope to avoid a bitter security pill.
-
Network packet analyzers enable enterprise 'packet peeking'
by Marcus J. Ranum, Contributor
Marcus Ranum explains how network packet analyzers offer a worm's-eye view of what's traversing an enterprise network.
-
Reality AV: Infosec storylines make for good reality TV ideas
by Lawrence Walsh
Is a Hacker Dating Game show that far-fetched? A few infosec storylines that would play well as reality TV ideas.
-
Lessons of cyberwar: A chance to boost information security budgets
by Andrew Briney
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO