You must have Credits on your Balance to download this sample
Pages 9 (2259 words)
Wireless Networks are widely used both for individual or business purposes. Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more…
You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1
"An increasing number of government agencies, businesses, and home users are using, or considering using, wireless technologies in their environments. Agencies should be aware of the security risks associated with wireless technologies. Agencies need to develop strategies that will mitigate risks as they integrate wireless technologies into their computing environments. This document discourses some common wireless technologies in brief, outlines the risks in relation to them and will offer some guidance for mitigating those risks. "2 It also provides "top 10 tips for wireless home network security"3. We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that.
No physical connection is established between the devices in a wireless network. No cable or wire to joint two devices to each other or one device to a network. All devices connect through radio frequencies to transmit the data. ...
Not exactly what you need?