Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Mobile

    Intel to Turn Off Wireless Tech in Grantsdale Chip Set

    Written by

    Mark Hachman
    Published May 18, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Intel will ship its Grantsdale chip set this summer with the wireless features turned off by default in an attempt to prevent the spread of unsecured access points.

      One of the features of Grantsdale is its integrated access point, which turns an ordinary PC into a gateway for other devices to connect to the network.

      IT managers already fear those APs will turn into back doors for hackers to wander into an otherwise secured corporate network, analysts say.

      /zimages/1/28571.gifThe Trusted Computing Group is working on a spec to secure wireless networks. Click here to read more.

      If nothing else, the introduction of Grantsdale will focus much-needed attention on wireless security issues. In addition to the access points theyve installed themselves, IT managers have already begun to fight the spread of so-called “rogue” access points, such as a worker installing a cheap access point for his or her own convenience.

      /zimages/1/28571.gifClick here to read about WLAN monitors that can thwart rogue access points.

      “War driving” mobile PCs have already been able to sniff out wireless communications at major retailers. The Grantsdale chip set is due in late June, sources have said; a complementary chip set for the enthusiast PC market, “Alderwood,” also contains the wireless access point technology.

      But the wireless configuration within Grantsdale will be set up in a way that enforces security provisions upon the user, said Howard High, a spokesman for Santa Clara, Calif.-based Intel Corp.

      In addition, the PCs will be shipped with Microsofts Windows XP Service Pack 2 (SP2) enabled, which includes an improved, software-based firewall.

      “Basically, the access point within Grantsdale is autoconfigured at off,” High said. “One has to go into the system and configure the system as an access point. If he chooses [to run the PC as] an access point, the Microsoft firewall will be automatically configured as default.”

      Configuring WEP or WPA security will require manual configuration like a standard wireless router, he said, adding, “I think that there is adequate security within the Grantsdale chip set.”

      The problem is that IT managers arent aware of the potential security risks, said Tim Scannell, president of Shoreline Research, a wireless consultancy in Quincy, Mass. “What I find in talking to these IT guys is that they go, I have a wired system, Im OK. But what they dont know is that they have a wireless back door built into it.”

      Next Page: Facing the challenge in the government sector.

      Government Challenge

      The challenge will be even greater within the government and military sectors, where classified information could potentially be exposed to intruders.

      The Department of Defenses Directive 8100.2, published April 14, states, “Introduction of wireless technologies in DoD ISs, including those creating an external interface to non-DoD systems (or allowing use of DoD wireless devices on non-DoD wireless networks) can have a significant adverse effect on the security posture of the IS and requires security review and documentation.”

      “Portable electronic devices,” such as wireless-equipped notebooks, that are directly connected to a DoD-wired network shall not be permitted to operate wirelessly while directly connected, the directive states.

      Another worry is that the new Grantsdale chip set will be secured by an unproven Microsoft software-based firewall first appearing in Windows XP SP2.

      Microsoft currently includes a basic firewall with Windows XP, but customers generally secure their networks behind a hardware firewall, or, in small businesses, equip their PCs with third-party solutions.

      As IT budgets rise, managers are going to have to look harder at third-party vendors that arent on the default “approved list” and can meet the new security requirements, Scannell said.

      Products from Newbury Networks Inc. and its competitors attempt to lock down corporate wireless networks by sniffing out “rogue” access points and establishing barriers beyond which Wi-Fi access is not permitted.

      Matthew Gray, founder and chief technology officer at Boston-based Newbury, said Grantsdale PCs have the potential to become “a substantial security breach.”

      “Any wired network solution, any wired network switch … can be potentially completely circumvented by a misconfigured desktop,” he said.

      At last weeks NetWorld+Interop show in Las Vegas, Newbury charted 386 distinct access points broadcasting open wireless networks that could be considered rogues, the company said in a statement Tuesday.

      But wireless back doors in the hands of users arent entirely new. Wirelessly connected workers first started migrating away from corporate cubicles with the spread of Intels Centrino chip sets, which combined a wireless client with the companys low-power Banias processor and chipset.

      A Centrino notebook can be manually configured to serve as a gateway to a wireless network by bridging the wired and wireless network though Internet Connection Sharing in Windows XP, or by forming an ad hoc network between two PCs. But doing so requires the permission of the other PC, Scannell said.

      For insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      PC vendors may implement additional levels of security to lock down corporate networks further. But for now, theyre remaining mum on the subject. Dell Inc., for example, declined to confirm that it would support Grantsdale at all.

      “For anybody to assume that Dell will support any products from Intel would be speculation, and we cant comment on that,” said Jeremy Bolen, a spokesman in charge of Dells Optiplex line.

      “You can assume, however, that we will be supporting industry-standard security solutions.”

      Check out eWEEK.coms Security Center at http://security.eweek.com for the latest security news, reviews and analysis.

      Be sure to add our eWEEK.com developer and Web services news feed to your RSS newsreader or My Yahoo page

      Mark Hachman
      Mark Hachman

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×