Wireless It And Rf Infrastructure For Stores

3830 words - 15 pages

1. Introduction
This document discusses the security implications of the proposed new wireless IT infrastructure for Stores. This document primarily focuses on issues related to the risk of adopting pre-shared keys for authenticating devices, as the risks associated with the end user devices are documented elsewhere.

The following is extracted from the TAD:
Currently there are a number of store devices and applications that rely on the existing Stores RF Infrastructure. The current RF systems were first deployed in stores several years ago. The supplier of these systems, Symbol Technologies has announced end-of-life for all products that comprise the current Stores RF Infrastructure.

Based upon current store opening plans an amount of stock was purchased and stockpiled prior to the Last Purchase date which should provide enough Frequency Hopping equipment to cover replacements and new store openings until the end of May 2007; however this has recently been reduced to the end on Feb 2007. After this date, opening stores with the old RF technology will not be possible.

2. Current Environment

The following is extracted from the TAD:

The security implemented within the existing stores RF environment relies on three elements; the fact that the technology used is quite obscure, the fact that the frequency changes frequently and the fact that a MAC address list is implemented through the use of an in-house application called Hyena.
The Frequency Hopping wireless network makes use of a technology which allows the FH enabled wireless devices and the FH Access Points to switch frequencies simultaneously at regular rapid intervals. This makes capturing or sniffing conversations tricky and would mean that anyone wishing to access the wireless network against our will would require a FH device (quite rare now) and the ability to switch frequencies at the same time as the AP did. This is truly security by obscurity

Further basic security is provided by a MAC address ‘white list’ of all HHT radio cards in the store which is up-loaded to all access points. This MAC-address list is currently administered by both Fujitsu and stores users. It is undesirable for the stores users to administer this list due to the need to remove systems management activities from the stores users so that they can concentrate on retail activities; and as it is seen as a security risk.

3. Proposed Change
The new infrastructure will be based around an 802.11b/g Wireless Network using the following primary components:
• Symbol Wireless Switches (WS5100)
• Symbol Windows Mobile 5 HHT (tbc)
• Symbol Client Bridges (CB3000)
• Zebra Mobile Ticket Printers

Originally it was planned to use a certificate based authentication model similar to the Head Office wireless solution.

It became apparent during testing of the various components from Symbol and Microsoft that there were a number of issues related to the correct handling of certificates...

Find Another Essay On Wireless IT and RF Infrastructure for Stores

Walmart and why it is good for

1043 words - 4 pages Walmart and Why It is Good for American Business "Consumption is the sole end and purpose of all production; and the interest of the producer ought to be attended to only so far as it may be necessary for promoting that of the consumer..." Adam Smith. Wal-Mart is a producer who has the sole purpose of promoting consumption of the consumer. Wal-Mart and its quest for capital improvement are playing a major and vital role in the evolution of

Child abuse and my answer for it

2002 words - 8 pages 12/01/03Child abuse and my answer for itImagine being a young child. Picture that someone is mistreating you, and you are completely unable to retaliate in any way. Imagine what would be running through your mind, all of the fear and hatred that you can do nothing with except hold it all inside. The United States government defines child abuse specifically as "any recent act or failure to act on the part of a parent or caretaker which results in

It is for Starbucks.Co caffee and resloves few questions about it success!

1354 words - 5 pages be customer oriented. For instance they does not include services they give as retail store operator and also their area of business is not only coffee but also ice cream, tea, food, and etc. According to our opinion they should include the service they provide for their customers like wireless internet connection in their stores, their office beverage service, their Starbucks card, and many other area of interest which they involve in their

Solution for the IT Security Banking and Ethics

911 words - 4 pages Solution for the IT security banking and ethics There are several solutions for the Islamic banking, IT security and ethics in where their practices should not contradict with the teaching of al-Quran but at the same time implement the technology to improve banking service to the society. Below are the solutions that might be suitable for the banking services to implement Islamic ethics in the business and their security perspectives. What you

Running For My Life and how it portrays struggle

845 words - 3 pages once intended for evil and transformed it into good." In my example, Lopez Lomong went from a rebel prison camp to a college graduate. So that's why he refers to himself as Joseph from the Bible. He does what may sound impossible, but with God, anything is possible. Allusion is presented in this example because Lopez Lomong refers to himself as Joseph from the bible because they have the same type of events happen in their life.Allusion

What Is Ethos and Why Is It Critical for Speakers?

1433 words - 6 pages which ethos is constructed. Louie Giglio is able to establish ethos before he even begins speaking, due to his reputation. Reputation refers to the audience’s knowledge of your understanding of a subject ("What Is Ethos and Why Is It Critical for Speakers?"). Giglio has established a solid reputation due to his educational background. Giglio received a Masters of Divinity at Southwestern Baptist Theological Seminary, and then furthered his


2944 words - 12 pages MANAGEMENT OF INFORMATION TECHNOLOGYNAME: SERKAN YILMAZID: L0273KEAKEA0614CLASS: BABSDATE: 28.08.2014LECTURER: ARMAN FARAKISHTOPİC: IDENTFYING AN ORGANISATION LOOKING FOR IT SYSTEM THAT USED IN AND GIVE RECCOMANDATION ABOUT IT.CONTENTAbstract .......................................................................................................... 3Intro

Marijuana Legalization -The reasons for legalizing marijuana and for keeping it illegal

1360 words - 5 pages on drug control programs, and if you figure that 20 percent of that is for marijuana, you could save almost 2 billion dollars a year on drug control programs. If you taxed a dollar per joint then you could make almost 4 billion dollars a year right there. So if you add all that together it's 12 billion dollars in keeping it illegal, 18 billion on helping people in jail get off of marijuana, and 4 billion dollars off of the possible tax, that's 34

"Othello" by William Shakespear.It is 1,685 words (5pages) and it is for a bookreport. I got an "A" on it.

1656 words - 7 pages who has a unique and interesting style.I found the story very interesting. I felt that it was very suspenseful due to constant new developments throughout the story. Near the beginning of the story, after Othello has gone to court and most of the characters have been introduced, Iago states to the audience,Thus do I ever make my fool my purse;For I mine own gained knowledge should profaneIf I would time expend with such a snipeBut for my sport

The Ritual of Human Sacrifices performed by the Aztec People. how it happens and reasons for it...

1268 words - 5 pages stability of the world depended on the relationship between the gods and man and so certain rituals were introduced such as human sacrifices and blood offering. These were made in recognition of the myth of mans creation and on a more practical level as a nourishment for the sun and all the other gods. (Bray 171) Bloodletting was a slightly minor ritual as compared to human sacrifices. Here the priests would nourish the gods by drawing blood from

Comparing Measure for Measure and The Merchant of Venice, As You Like It, and Twelfth Night

1994 words - 8 pages Parallels between Measure for Measure and The Merchant of Venice, As You Like It, and Twelfth Night What is comedy?  Funk and Wagnalls New Encyclopedia says: "A comedy depicts the follies and absurdities of human beings."  Webster's Dictionary defines comedy as: "A drama or narrative with a happy ending."  Shakespeare's play, Measure for Measure, fits both of these descriptions.  Follies and absurdities are present in the play: Lucio

Similar Essays

Network Infrastructure Focusing On Wireless Networks: Bluetooth, Wi Fi And Mobile Phone Networks.

4377 words - 18 pages web browsers and web servers communicate. [6]Wireless NetworksA wireless LAN also known as WI-FI or WLAN is a network access technology that provides connections between a wireless station and a wired network (LAN). It does so using radio waves rather than the standard cable infrastructure. Using this technology allows users to travel between different areas within range of a WLAN and still have access to the resources and services on the wired

Overall Discussion On What It Does And How The Memory Stores Info.

1250 words - 5 pages don't pay attention to is not likely to move on for further processing.Information passes from sensory information storage into short-term memory, where again it is held for only a short period of time, a few seconds or minutes. Whereas sensory memory holds the complete image, short-term memory stores only the interpretation of the image. If a sentence is spoken, sensory memory retains the sounds, while short-term memory holds the words formed by

An Analysis Of Strategic Role Of Information Systems, Specific Social, Ethical And Legal Issues, It Infrastructure And Emerging Technologies, And Information Systems Security Within Fed Ex Corporation

5469 words - 22 pages economic downturn (Risher 2009, p.66).4. IT infrastructure and emerging technologies4.1 IT infrastructure of FedExAccording to Laudon and Laudon (2010, p.227), IT infrastructure is defined as 'the shared technology resources which provide the platform for the specific information system applications of a firm…a firm's IT infrastructure consists of hardware, software and services. The following several paragraphs will talk about the IT

Working At 14 And Paying For It

776 words - 3 pages Working at 14 - And Paying for It"Working at 14 - And Paying for It," an article by Thomas Hine, which appeared in the New York Times on November 26 emphasizes teenagers and their work-experiences while going to school. Thomas Hine is neither completely in favor of teenage employment nor he is against it. Hine is just presenting the facts to the readers based on his research. I believe he presents excellent facts and well formulated statistics