Wireless Communications - Benefits and Risks - Essay Example

Only on StudentShare

Extract of sample
Wireless Communications - Benefits and Risks

. large number of business & educational journals & white papers have emphasized the security issues of wireless communications and need for stringent controls given that enhanced accessibility features of such technologies have also given birth to substantial access control vulnerabilities thus giving chance to unauthorized intruders to access the business resources of organizations. This paper critically evaluates the details of prevailing wireless technologies, their business benefits, associated security risks and the current mitigation strategies recommended by wireless security experts. The objective of the paper is to present first hand understanding of the proposed subject after carrying out in depth literature review. [Cisco Systems Inc. 2003; Wong and Dunn, 2003; Netgear Inc. 2007; WiFi, 2003; Rasori, Paul. 2004; Kim, S.H., Mims, C., & Holmes, K.P. (2006] ...
Download paper

Summary

Wireless technologies allow end users to remain connected to their business services much more than wired technologies especially when the users are mobile. Modern businesses demand more mobility of people in the form of either travelling or else moving extensively in Office or Campus environments…
Author : medhurstalan

Related Essays

Wireless Security in Businesses
Businesses' concern in taking wireless technology a stride ahead of chat is an international issue. Wireless security is at least as good quality as Internet security. Impending technologies and values will create wireless security better than wireline security. That's for the reason that security is being addressed in the early days of wireless communications. (Bill, 2004. 3) Wired security, though, fundamentally resulted from a hodgepodge effort to block holes after they were uncovered. ...
6 pages (1506 words) Essay
Wireless Security
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft. (Johansson et al., 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use. For example, people committing fraud or dealing in illegal materials via the Internet would find...
15 pages (3765 words) Essay
Wireless Security Essay
You can simply use Laptop, PDA or Cell Phones to establish connection to each other via Bluetooth. These devices all give you the ability to "enter a network mobile which has many benefits for you. However, wireless networking has many security issues. Crackers have found wireless networks relatively easy to break into, and even use wireless technology to crack into non-wireless networks."1 ...
9 pages (2259 words) Essay
Excessive filtering of the Internet in schools
Today the number of Laptops, PDA's and Mobile Phones that use Wireless Communication Technologies is increasing in every minute. PDA's give you the opportunity to access to the internet, check your email and much more. Mobile phones too, they help you to send Multi-Media Messages (MMS, for example photo or MP3 files) to other people with cell phones or individual email addresses. You can also use General Packet Radio Service (GPRS) that is probably provided by your mobile phone network's operator to access to the internet. You can simply use Laptop, PDA or Cell Phones to establish connection...
10 pages (2510 words) Essay
Wireless Network System for an IT Training Centre
This information is then transmitted through air with the help of a transmitter and received at the other end through a receiver and demodulated. Since both transmission and reception of the signals has to be carried out at the same point, therefore a device known as an 'Access Point' (AP) is used which is a simple transmitter/receiver or transceiver. By assigning different frequencies to different users many users can access the network simultaneously without interfering. As is evident, the access to a wireless network can be gained only if the users are having devices which have wireless...
14 pages (3514 words) Assignment
Wireless technology
Many of these features are migrating to consumer customers. For example, most consumer videoconferencing technology uses the same SIP protocol used by VoIP. ...
6 pages (1506 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!