Thursday, May 2, 2019

Wireless Security Research Paper Example | Topics and Well Written Essays - 3000 words

Wireless Security - Research newspaper publisher ExampleOn the other hand, there are countless bail and privateness issues also acclivitous in radio set communicateing environments. Though, the new technologies require more and more high level application of radio communication networks, but such implementations are being established without giving significant concentration to privacy and credentials related issues. Consequently, the majority of wireless networks around the world are in danger regarding security and safety. Thus, there are a lot of chances that someone with appropriate equipment could be able to spy network traffic. In this scenario, they can get access to users passwords and other data (Gerkis, 2006 The defer University of New Jersey, 2006). In addition, these security issues and attacks are not immediately theoretical. Additionally, techniques and tools to tap near wireless networks are extensively accessible, even for palmtop devices (Gerkis, 2006 The Stat e University of New Jersey, 2006). In this situation there is vital need for implementing wireless security. Wireless security prudence has turned out to be a hot issue in literature. This paper boons a detail analysis of wireless security related issues and their management. This research will analyze some of the important aspects of wireless security, main challenges and possible mitigation techniques. TECHNOLOGY INVOLVED IN WIRELESS NETWORKS Consider the fact that users of wireless fidelity (wireless local area network) are able to travel along with their laptop computers and other devices from one spatial relation to another inside their offices or houses without breaking the link with the network. Thus, many corporations and general public at the present think that wireless communication based devices are very useful, efficient, and easy to operate. On the other hand, ad hominem networks based on wireless technology help users receive and distribute data, as well as softw are applications, by making use of network systems and other users of the network with well-matched devices, without establishing a connection to printer cables and other secondary device links. In fact, with wireless networking users of small PDA, hand-held devices and cell phones can in effect coordinate data and information among PDAs and personal computers, as well as are able to efficaciously make use of internet based services like that web browsing, email and internet access. In addition, wireless communications can help individuals and business firms reduce their networking or wiring costs (Radack, 2011 Gerkis, 2006 css-security, 2010). In this scenario, Information Technology Laboratory established by NIST (National Institute of Standards and Technology), presents various standards and measures which can be choose to enhance safety and security of wireless communication networks. Additionally, National Institute of Standards and Technology Special exit (SP) 800-48,Wirel ess Network Security, 802.11, Bluetooth, and Hand-held Devices, whose authors were Les Owens and Tom Karygiannis, outlines 3 main and fundamental aspects of wireless security (Radack, 2011 Ge

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.