Abstract: | Much of the information available about wireless security revolves around securing the actual wireless communications; insuring the confidentiality, integrity, and availability of the data on a wireless network. However, what often goes overlooked is the wireless device itself. These devices are wireless for a reason; they are mobile and generally designed to be used in any location a user has access to a network. Phones, laptops, and PDA's are all purchased primarily for their mobility, not their stunning good looks. |