Improve WiMAX System Security Using NIST Recommendations

John Storts

Knowledge Network contributor NIST recently uploaded a document that provides recommendations designed to improve Worldwide Interoperability for Microwave Access (WiMAX) security. The name "WiMAX" was created by the WiMAX Forum. The forum, dedicated to promoting the interoperability and conformity of the standard, defines it as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL."

 

Slide Show

Nine Steps to Securing Your Wireless Network

Steps you can take to protect your wireless network.

 

The Guide to Securing WiMAX Wireless Communications provides a brief history of the origins of and technical details for the telecommunications protocol. In order to protect against threats such as those arising from man-in-the-middle attacks, eavesdropping, message modifications and denial-of-service attacks, the NIST recommends that organizations:

  • Create and enforce wireless metropolitan area network (WMAN) security policies.
  • Assess WiMAX technical countermeasures before implementing WiMAX tech.
  • Require mutual authentication for WiMAX devices.

 

Protect your business from WiMAX wireless interface threats by following the NIST's recommendations.

 


More from the Knowledge Network

Guidelines on Firewalls and Firewall Policy

Technical Guide to Information Security Testing and Assessment

Security Considerations for Voice Over IP Systems



Add Comment      Leave a comment on this blog post

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data


Thanks for your registration, follow us on our social networks to keep up-to-date