Wednesday, May 6, 2020
Essay about Wireless Network Security â⬠How Secure Is It
WIRELESS NETWORK SECURITY ââ¬â HOW SECURE IS IT? by Chris Bradley ITT Technical Institute Information Systems Security student November 23, 2010 Dr. French: This report on ââ¬Å"Wireless Network Securityâ⬠is submitted in accordance with your assignment for November 23, 2010. Sincerely, Chris Bradley ABSTRACT For this project, I asked the question ââ¬Å"is wireless network protection truly safe?â⬠My literature search led me to conclude that, if consumers use the most up-to-date and secure wireless network protection, they can connect to their wireless network and conduct business safely and confidently. TABLE OF CONTENTS Title Page ----------------------------------------------- i Letter of Transmittalâ⬠¦show more contentâ⬠¦Another helpful piece of advice that Vakil noted was, when using Internet browser windows, to check the address line to see if the ââ¬Å"httpâ⬠is replaced with ââ¬Å"httpsâ⬠and to look for a small padlock in the status bar at the bottom of the browser window (Vakil, 2005). This will tell you if the web site you are accessing is secure. It is also recommended that a consumer use a personal firewall and the most up-to-date virus protection software (Breeding, 2005). Based on my research I concluded that if consumers use the most up-to-date and secure wireless network protection, they can connect to their wireless network and conduct business safely and confidently. ACKNOWLEDGEMENTS I would like to thank Dr. Vikki French for giving me the insight and instruction that I needed to complete this paper. I would also like to thank my Parents, Duane and Donna Bradley, my Fiancà ©, Kris Mason, my son, CJ Bradley, and my daughter, Charity Hutchinson, for their unending support and understanding while I spent countless hours researching articles for and writing this paper. REFERENCES Breeding, M. (2005). Implementing wireless networks without compromising security. Retrieved September 21, 2010, from http://web.ebscohost.com.proxy.itt-tech.edu/ehost/detail?vid=1amp;hid=111amp;sid=3a4ec339-2e52-4022-a35a-1d6dba815e6b%40sessionmgr111amp;bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=f5hamp;AN=16223798. Vakil, F. (2005). Wireless networks andShow MoreRelatedWireless Network Security : Abstract1520 Words à |à 7 Pages Wireless Network Security Abstract This is the study over the wireless network security. As the wireless communication has the different way of physical transport compared to wire environment of communication thus we have to use different measure to secure a network in wireless environment. Wireless networking has more security threats and vulnerabilities and we must have an effectiveRead MoreQuestions On Internet Security Protocols1007 Words à |à 5 PagesCapstone Essay 1st hour 4/10/2015 Destiny Case Internet Security Protocols Internet security protocols use many different methods to protect your computer from dangers across the internet. Because there are so many methods to do this with, there are also many protocols concerning internet security. Internet protocols as a group are often referred to as TCP or IP. TCP stands for Transmission Control Protocol and IP stands for Internet Protocol. Internet Protocol will deal only with packets but TransmissionRead MoreWireless Security : Wireless Network Essay1089 Words à |à 5 Pages Wireless Security Overview Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the Internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: Wireless Wide Area Networks (WWAN), Wireless Local Area Network (WLANs), Wireless Personal Area Network (WPAN )and etc. WWAN includes wide coverage area technologies such as 2G cellular, CellularRead MoreWireless Networks Are Becoming A Better Choice1484 Words à |à 6 Pagesreliable. Wireless technology is going to be really important to have. It is already important in both the home and office sense. Wireless networks are already starting to replace Wired Networks. Nobody wants to have cables in their homes and offices anymore. The reason is simple and to the point: there isnââ¬â¢t a point to having long cables laying on the floor or having to make holes to push the cables in walls and through walls. The things that individuals and companies need to know is that Wireless NetworksRead MoreMobile Distributed Systems For Secure Communication Essay1723 Words à |à 7 PagesSystems for secure communication Team: Saylee Joshi Shrutee Patil Abstract: Wireless communication and mobility introduced a new paradigm in Distributed Systems. We examined short-range wireless data transmission using mobile agent (developed using Android OS). Presence of mobility in distributed systems introduces new challenges of reliable and secure communication. In this project, we propose a secure way of communication via wireless network (comprised of P2P nodes) ââ¬â Bluetooth and secure the dataRead MoreSecurity Policy : Security Policies Essay825 Words à |à 4 PagesChapter ââ¬â 17 Security Policies Notes â⬠¢ Security policy define constrain within which a network or system must operate. o Every organization has different policy based on their requirements. o The difference in security policies is based on the differences in security threats and asset values. â⬠¢ General Functional Policies o When strictly followed and combined with effective technical solutions, wireless local area network security policies can reduce intrusions, risks, and costs associated withRead MoreEssay about Risk of Mobile Technologies617 Words à |à 3 PagesThoroughly identified the risks inherent in the use of wireless and mobile technologies. Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tiedRead MoreWireless Networking in a Hospital Essay examples1444 Words à |à 6 PagesEXECUTIVE SUMMARY The breakthrough of wireless technology has introduced new possibilities for healthcare. These wireless networks allow connection and control between computers, handheld devices, printers, scanners, and other peripherals without the hassle of cords and cables. They provide crucial mobility that is necessary in the modern hospital. In areas of constant activity, such as the ER, the ICU, and the surgical recovery room, immediate information such as a patients test results wouldRead MoreTechnology in the Modern Medical Office Essay1739 Words à |à 7 Pagesdoctors and support staff decides they want to set up a wireless LAN to let them to take their laptops with them from room to room for real-time data entry on patient records. The doctors know they need to comply with HIPPA controls over patient records and are concerned that a Wi-Fi LAN could compromise security. The intent of this paper is to offer advice to the medical office manager about the implementation of a Wi-Fi access po int for their network. I will cover the elements needed within a policyRead MoreWireless Security And The Internet1404 Words à |à 6 Pagesessential to secure your network. This is done for many reasons, since unauthorized users can steal data, alter it or even use your network to preform illegal activities, which you will be responsible since itââ¬â¢s your network. Nowadays, most of us use a local wireless network to connect onto the internet. This has become the norm since more and more devices, such as smartphones and tablets, are being introduced into our lives. Protecting a wireless network can be more complicated that a wired network, since
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.