Wireless Communications - Benefits and Risks

Masters
Essay
Technology
Pages 13 (3263 words)
Download 0
Wireless technologies allow end users to remain connected to their business services much more than wired technologies especially when the users are mobile. Modern businesses demand more mobility of people in the form of either travelling or else moving extensively in Office or Campus environments…

Introduction

. large number of business & educational journals & white papers have emphasized the security issues of wireless communications and need for stringent controls given that enhanced accessibility features of such technologies have also given birth to substantial access control vulnerabilities thus giving chance to unauthorized intruders to access the business resources of organizations. This paper critically evaluates the details of prevailing wireless technologies, their business benefits, associated security risks and the current mitigation strategies recommended by wireless security experts. The objective of the paper is to present first hand understanding of the proposed subject after carrying out in depth literature review. [Cisco Systems Inc. 2003; Wong and Dunn, 2003; Netgear Inc. 2007; WiFi, 2003; Rasori, Paul. 2004; Kim, S.H., Mims, C., & Holmes, K.P. (2006] ...
Download paper
Not exactly what you need?

Related papers

Wireless Security in Businesses
Businesses' concern in taking wireless technology a stride ahead of chat is an international issue. Wireless security is at least as good quality as Internet security. Impending technologies and values will create wireless security better than wireline security. That's for the reason that security is being addressed in the early days of wireless communications. (Bill, 2004. 3) Wired security,…
Wireless Security
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft.…
Wireless Security Essay
You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1 …
Excessive filtering of the Internet in schools
Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more. Mobile phones too, they help you to send Multi-Media Messages (MMS, for example photo or MP3 files) to other people with cell phones or individual email addresses. You can also use…
Wireless Communications - Benefits and Risks
. large number of business & educational journals & white papers have emphasized the security issues of wireless communications and need for stringent controls given that enhanced accessibility features of such technologies have also given birth to substantial access control vulnerabilities thus giving chance to unauthorized intruders to access the business resources of organizations. This paper…
Wireless Network System for an IT Training Centre
This information is then transmitted through air with the help of a transmitter and received at the other end through a receiver and demodulated. Since both transmission and reception of the signals has to be carried out at the same point, therefore a device known as an 'Access Point' (AP) is used which is a simple transmitter/receiver or transceiver. By assigning different frequencies to…
Wireless technology
Many of these features are migrating to consumer customers. For example, most consumer videoconferencing technology uses the same SIP protocol used by VoIP. …