Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Spec in Works to Secure Wireless Networks

    By
    Mark Hachman
    -
    May 10, 2004
    Share
    Facebook
    Twitter
    Linkedin

      The Trusted Computing Group said Monday that it is working on a specification to ensure that wireless clients connecting to a network wont serve as a back door to worms and crackers.

      Officials within the TCG, based in Portland, Ore., said the industry standards body is developing a “Trusted Network Connect” specification, designed to audit wireless-enabled PCs when they first make contact with an enterprises wireless network.

      The specification will be finalized later this year, said officials from the group, which comprises computer and device manufacturers, software vendors and others.

      Although a client or customer connecting to an enterprise network may not overtly be seeking to do harm, the laptop may in fact hide an unpatched system that could serve as an unexpected back door into an otherwise secure system. Likewise, a network administrator cannot be sure whether a laptop hides a worm that might otherwise have been blocked by a wired firewall.

      When completed, the specification will serve as a means by which network security and network infrastructure vendors can ensure a level of compliance with the best practices of network security, executives said.

      The spec will improve AAA (authentication, authorization and accounting) softwares ability to make a decision before allowing admission to the system, said Ned Smith, the TCG infrastructure working groups co-chairman and an architect at Intel Corp. in Santa Clara, Calif.

      “Its a proactive approach to security,” Smith said. The specification was designed with wireless clients in mind, although it also may be applied to wired networks. he said.

      /zimages/2/28571.gifFor insights on security coverage around the Web, check out eWEEK.com Security Center Editor Larry Seltzers Weblog.

      The specification will specify a level of trust for network endpoints, characterized by the version number of specific applications; whether those applications have been patched; and whether those OSes and applications are free from viruses, as defined by the revision numbers of the signature libraries used within antivirus applications.

      If a client fails to meet those specifications, the Trusted Network Connect specification will define a process by which the client is quarantined until the appropriate patches and antivirus tools have been applied.

      /zimages/2/28571.gifClick here to read about talks between the U.S. and Chinese governments on wireless security standards.

      The TCG is more commonly known for its Trusted Platform Module (TPM) specification, which defines the parameters for a security chip that can be embedded onto a PCs motherboard.

      The TPM is designed to work with the upcoming Next-Generation Secure Computing Base (NGSCB) technology in Microsoft Corp.s Longhorn OS and other trusted operating systems to ensure that data is viewed only by the appropriate users.

      “Part of whats interesting to the TCG is linking identity-based platform authorization to the network connect decision,” Smith said.

      Extreme Networks, Foundry Networks Inc., Funk Software Inc., InfoExpress Inc., Juniper Networks Inc., Meetinghouse Data Communications, Network Associates Inc., Sygate Inc., Symantec Corp., Trend Micro Inc. and Zone Labs Inc. have joined TCG to participate in this effort. TCG members Hewlett-Packard Co., Intel Corp., Verisign Inc. and others are also participating.

      /zimages/2/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for security news, views and analysis. Be sure to add our eWEEK.com security news feed to your RSS newsreader or My Yahoo page: /zimages/2/19420.gif http://us.i1.yimg.com/us.yimg.com/i/us/my/addtomyyahoo2.gif

      Mark Hachman
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×