3.5. Understanding Mobile Devices

Mobile devices, including pagers and personal digital assistants (PDAs), are popular. Many of these devices use either RF signaling or cellular technologies for communication. If the device uses the Wireless Application Protocol (WAP), the device in all likelihood doesn't have security enabled. Several levels of security exist in the WAP protocol:

  • Anonymous authentication, which allows virtually anyone to connect to the wireless portal

  • Server authentication, which requires the workstation to authenticate against the server

  • Two-way (client and server) authentication, which requires both ends of the connection (client and server) to authenticate to confirm validity

Real World Scenario: Look for Ways to Harden Your ...

Get CompTIA Security+™ Deluxe: Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.