The Unique Challenges of Keeping WLANs Secure in Manufacturing
Author/Blog Contributor - Jesse Frankel, Wireless Intrusion Research Team
Date: August 02, 2010
Wireless LANs have been used in manufacturing environments for some time now, as industry-specific mobile application devices can greatly increase productivity and efficiencies for these businesses. However, these facilities face a unique challenge because they often use a wide variety and number of mobile devices. They also frequently use a large number of older, sometimes outdated, devices on a day-to-day basis throughout their network and work environment. Unfortunately, many of these devices have either very limited or no network security capabilities at all, creating constant headaches for the wireless network manager.
While many of today's newer mobile devices are able to support modern security mechanisms like 802.11i (which utilize strong encryption and robust authentication components), older devices are largely limited to the original WEP mechanism, which has been shown to be cryptographically weak, and is not a sufficient approach for protecting the potentially sensitive data transmitted throughout a manufacturing network.
This mix of legacy with new devices within the manufacturing environment can pose a serious security risk for the organization. Managers have to deal with new tools and devices that often leverage the latest built-in security capabilities, yet monitor and integrate older tools that possibly create gaping holes in the security infrastructure of a facility. It can turn into a wireless circus act. Because of this, it's important that manufacturing facilities are able to monitor the entire wireless network and protect against both inside and outside threats, with a full-time, end-to-end WLAN security monitoring system.
Unfortunately, the manufacturing sector (like many other sectors) is plagued by the notion, "Isn't the security we have good enough?" Many of these businesses are led to believe that the security capabilities built into the latest mobile or network devices offer "good enough security," but they don't realize just how untrue that statement is until it's too late. The mix of legacy infrastructure and devices in manufacturing environments leave these organizations in a precarious security position. These older, unsecured devices and components can provide the loophole hackers or other criminals need to exploit a network. The only way to protect the wireless network is by continuously (24x7) monitoring and protecting of all your wireless assets with a WIPS/WIDS solution.
What's your take on WLAN challenges facing manufacturing facilities?
Crhstina Aug. 26, 2013 9:57 PM
(AMD C70 1.0GHz Processor, 4GB RAM, 500GB HDD, LAN, WLAN, Webcam, Integrated Graphics, Windows 8) (Personal Computers) Bought this for holidays on motbroike! Looked at various tablets / netbooks. This was small enough to pack easily but had reasonable size screen (big enough to watch films /Skype etc together) and conventional keyboard which we find better for lengthy written communication. The volume is slightly on the low side but we could still listen to i player etc. without having to bend over the computer. The rest of the spec met our needs as with most people we found Windows 8 a bit of a challenge intially. Would have been nice if it had come with Office loaded but there are free substitutes available if you don't want to pay out for these apps.
Tammy Aug. 27, 2013 8:38 PM
There should be a ltitle fan shaped symbol in the bar at the top of the screen. You can click on that to enable wireless and see available networks. It doesn't have to be an airport. It will connect with anything. You can also download the free Bootcamp from Apple and install XP along with OSX now.
Hatus Aug. 28, 2013 7:44 AM
Subsequently, shopping your own penrosal Chanel the the purse from a certified boutique often times will be it will cost the finest rates while not pay only money for the quality of the vitamin and mineral, the prices supply premiums with reason of the brand designation. A different demonstrate letter is the fact these kind of accessories oftentimes purely carry up to date creations to their selections, since it's with the help of fashion stores your aim to await the news bullitains of refer to and invest name leaders. http://ryhsgelhpw.com [url=http://nodioiu.com]nodioiu[/url] [link=http://jvzzgqd.com]jvzzgqd[/link]
Ztrellita Aug. 30, 2013 1:56 AM
I have been surfing on-line garteer than three hours these days, but I by no means found any fascinating article like yours. It's beautiful value enough for me. In my view, if all website owners and bloggers made excellent content material as you did, the web will likely be a lot more useful than ever before. When you are content to be simply yourself and don't compare or compete, everybody will respect you. by Lao Tzu.
Bayu Sep. 6, 2013 8:03 PM
. Your favorite resaon seemed to be on the web the easiest thing to be aware of. I say to you, I certainly get annoyed while people think about worries that they plainly do not know about. You managed to hit the nail upon the top and also defined out the whole thing without having side effect , people can take a signal. Will likely be back to get more. Thanks http://nmtxfsv.com [url=http://prmntl.com]prmntl[/url] [link=http://fezlhdad.com]fezlhdad[/link]
Unlimited Satellite Internet
Jan. 20, 2015 6:17 AM
Excellent and decent post. I found this much informative, as to what I was exactly searching for. Thanks for such post and please keep it up.
Post a Comment: