NCJ Number
191455
Journal
Law Enforcement Technology Volume: 28 Issue: 8 Dated: August 2001 Pages: 70-74
Date Published
August 2001
Length
5 pages
Annotation
This article examined the advancement in wireless devices and the ability to exchange information wirelessly and the need to secure wireless data and transmissions through policies and protective measures.
Abstract
The innovation of wireless technology has enabled people to access important information from anywhere at anytime, as well as allowing emergency services and law enforcement agencies to stay in contact with headquarters and all essential information. However, with this advanced wireless technology comes the revolutionary cybercrime. Five essestial aspects of wireless security were identified as needing to be present in order for information to be transmitted without being altered or read by anyone else and included: (1) authentication; (2) authorization; (3) confidentiality; (4) integrity; and (5) non-repudiation. To ensure that these aspects are present, professions, especially the public safety sector, must execute a security policy at the onset of a wireless infrastructure implementation. A comprehensive security program will assist in the prevention and detection of security breaches. In addition, confidential data exchanges require higher security. To protect wireless transmissions, a complete Public-Key Infrastructure (PKI) was discussed as an ideal solution. This system verifies and authenticates the validity of each party involved in an Internet transaction. In addition to the PKI security method, two additional protective measures were suggested; encryption and wireless transport level security.