.

Monday, February 11, 2019

computers :: essays research papers

SECURITY OF WIRELESS COMMUNICATIONSIntroduction radiocommunication cheats, like all technologies that provide external access to corporate net incomes, rescue pledge challenges. With radio set specimens and practices still rapidly evolving, it is important to understand the strengths and limitations of addressable technologies in order to implement a secure solution. Extending current protection policies to encompass receiving set windings requires an understanding of the security features of both wireless devices and wireless networks.Purpose of the StudyThe purpose of the study was to assist in the ending whether Lotus Development should extend current security policies to encompass wireless devices. The following are critical security questions What challenges are faced with wireless security? How can you verify that the device being used is very in the hands of an authorized user? How can you enhance the security of the device?How secure is the over-the-air network between the organization and the wireless device? How can you secure the wireless session?Should Lotus development accept wireless devices in their security policies?Research Methods and ProceduresThrough traditional and electronic inquiry of books, periodicals, and business journals, secondary research was conducted. Figures were constructed through extensive research and study of interactions of networks. Wireless Security Challenges roving devices and wireless networks rely on a broad spectrum of technology, much of it cutting-edge. In comparison to PCs, each sectionalisation of mobile device currently represents a unique hardware and software product platform. smooth phones, for example, have varying capabilities and limitations both as computing devices and as client devices accessing corporate networks. The wireless networks that support mobile devices are in addition diverse. By relying on industry standard protocols like TCP/IP, HTTP, SMTP and TAP, Mobile Services supp orts many of the major wireless networks currently in operation. This standards-based come up also provides MSD with a common security model that can check across wireless networks, while at the same time winning some of the complexity out of doing business with different wireless network providers (Braden 1997).However, it is important to understand that there is currently no industry-wide security standard that will work on every mobile device and on every wireless network, in the way that X.509 and SSL span the PC universe. MSD bridge over this gap wherever possible by adding its own security features (Freeburg 1991). Mobile Device SecurityMost mobile devices currently provide however a simple username/password combination to block use of the device (a few also offer local data encryption). And since most users do not employ even this rudimentary level of security, mobile devices like pagers, mobile phones and PDAs are essentially unsecured (Aziz 1993).

No comments:

Post a Comment