Friday, September 27, 2019
An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Research Paper
An Evaluation of Wireless Intrusion Prevention and Protecting Insecure Channels - Research Paper Example Now the latest mobile and computing devices such as iPhones also provide considerable support for accessing Internet through wireless computing. Without a doubt, wireless computing offers a large number of benefits and opportunities for both business and individual users but at the same time they also facilitate hackers and attackers to complete their illegal tasks. This paper presents a detailed analysis of some of the important aspects associated with wireless networks. This paper discusses how wireless networks work, what benefits do they offer. This paper also discusses various types and protocols for wireless networks. This paper will also discuss a number of security threats associated with these networks. This paper also discusses various strategies to deal with these security threats. ... This paper also discusses various types and protocols for wireless networks. This paper will also discuss a number of security threats associated with these networks. This paper also discusses various strategies to deal with these security threats. Introduction Wireless networking has emerged as a very useful technology and the majority of organizations have started moving their network infrastructures to wireless networking environments. The basic reason of this transformation is the opportunities and advantages offered by wireless technology at the minimum cost and with maximum convenience. In fact, wireless networks allow organizations to build their communication infrastructures without using wires. In order to enable communications, these networks use radio waves instead of wires. As a result, these networks can be established in areas where wires cannot be used. Without a doubt, wireless technology offers a large number of advantages over traditional networking technologies tha tââ¬â¢s why their usage is continuously increasing with the passage of time, but they also bring serious security issues that affect the quality of communication. Additionally, wireless networks can face a variety of challenges and in some cases people using these networks lose their personal data which can be used to carry out illegal tasks (Neumerkel & Grob, 2006; Klasnja, et al., 2009). The basic purpose of this paper is to present a detailed analysis of wireless technology and issues associated with them. The structure of this paper is as follows: The discussion of the topic starts with a detailed introduction of wireless technology. After that a detailed discussion on wireless security issues has been provided. This
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.