{"title":"The Five Myths of Wireless Security","authors":"John Kindervag","doi":"10.1201/1086.1065898X/46353.15.4.20060901/95120.2","DOIUrl":null,"url":null,"abstract":"Abstract Those who have ever watched the television show MythBusters know that many of the popular beliefs most people hold to be true crumble under investigation. The same holds true in the information technology world. Most myths investigated by the mythbusters are harmless and fun, but in information security, the unexamined myth can be both dangerous and costly. It is imperative that the InfoSec professional not take security trends and myths at face value, but instead thoroughly investigate every statement to make an informed decision about the veracity of individual security ideas. This is especially true in the area of wireless networking, which is the newest, most immature, and potentially insecure of all of the currently existing networking methods.","PeriodicalId":36738,"journal":{"name":"Journal of Information Systems Security","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Systems Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/1086.1065898X/46353.15.4.20060901/95120.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 2
Abstract
Abstract Those who have ever watched the television show MythBusters know that many of the popular beliefs most people hold to be true crumble under investigation. The same holds true in the information technology world. Most myths investigated by the mythbusters are harmless and fun, but in information security, the unexamined myth can be both dangerous and costly. It is imperative that the InfoSec professional not take security trends and myths at face value, but instead thoroughly investigate every statement to make an informed decision about the veracity of individual security ideas. This is especially true in the area of wireless networking, which is the newest, most immature, and potentially insecure of all of the currently existing networking methods.