StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Comparing And Contrasting Wireless Security - Essay Example

Cite this document
Summary
Running head: WEAKEST LINK REVIEW 1 The Weakest Link: A Review of the Literature in Wireless Security Your Name Your College The Weakest Link: A Review of the Literature in Wireless Security As Loo (2008) writes, “the strength of a computer system’s security is always measured by its weakest component” (p…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Comparing And Contrasting Wireless Security
Read Text Preview

Extract of sample "Comparing And Contrasting Wireless Security"

Download file to see previous pages

Yet, as recent events have shown, this wall is at best overstated and at worst illusory altogether. Regardless, wireless security is no longer a concern for only the home and business. As wireless access points grow in popularity, there is a growing need to secure networks that are designed to be used by members of the public. As Chenoweth, Minch and Tabor (2010) point out, these networks offer little or no security for the end user, which is a completely different problem, but related in the potential consequences of misuse.

Finally, Potter (2006) believes that achieving true security at one of these public networks is impossible and that “Laptops and PDAs are so vulnerable in wireless hotspots, users would do well to turn them off” (p. 51). The views of wireless security that those authors give are separable into two different sets of categories. First, the authors either give an optimist/descriptive view or a pessimist/normative view of how end users should interact with wireless technology given security concerns.

Loo (2008) witnessed the breach in internet security at a U.S. credit card processing center (a “descriptive” view) and wrote about how users can protect themselves. On the other hand, Chenoweth, Minch and Tabor (2010) and Potter (2006) described how there is virtually no security on wireless networks (a “pessimistic” view) and that users might be better off not using them (“a normative view”). Second, the authors give either an account of private home or business wireless security or an account of public hotspot wireless security.

Once again, while Loo (2008) is writing primarily about private end users operating their own private networks, Chenoweth, Minch and Tabor (2010) and Potter (2006) are discussing networks in the context of public hotspots, as opposed to private channels. Seeing the literature in this way, one might realize that there is a certain consistency at work: from the time between 2006 and 2010, little advancements have been made in improving the wireless security for public networks. Meanwhile, private networks remain potentially unprotected, but that the weakest link in that chain is the end user, not the network itself as seems to be the case with public wireless hotspots.

From this perspective, one can begin to put into context the kind of advice or observations that each article makes. Loo (2008) opens his discussion of private network wireless security by overviewing why end users are the weakest components in a computer system’s security. He writes, “In most systems, the weakest components are the end users, particularly when they are accessing the corporation’s databases with wireless facilities at home” (p. 68). Of course, what he is suggesting here is that corporations must safeguard their information from private individuals because, although those private individuals may think their connection is secure, it may be the easiest access way that an outsider has to gain access to the sensitive information contained within a corporation’s network.

Loo (2008) dispels some of the myths above this private security, including the common belief that home computers are not attractive to hackers. However, this belief is false considering the increasingly digitized way that individuals share knowledge and communicate. Not only

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Comparing And Contrasting Wireless Security Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1419409-comparing-and-contrasting-wireless-security
(Comparing And Contrasting Wireless Security Essay)
https://studentshare.org/environmental-studies/1419409-comparing-and-contrasting-wireless-security.
“Comparing And Contrasting Wireless Security Essay”, n.d. https://studentshare.org/environmental-studies/1419409-comparing-and-contrasting-wireless-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Comparing And Contrasting Wireless Security

Two main operating systems: Windows 7 and OS x 10.6

In the paper “Two main operating systems: Windows 7 and OS x 10.... ” the author contrasts and compares new technologies that benefit from the multi-core CPUs processing where they transfer graphics and animation processing to peripheral devices such as graphics cards.... hellip; The author states that Windows OS is becoming slick, smooth and easier to use as a result of iterations on the operating system....
9 Pages (2250 words) Essay

Module review questions

That is, it has better data security compared to the file processing approach.... How will wireless information appliances and services affect the business use of the Internet and the Web?... t is vital to acknowledge that wireless information appliances and services will have great effect on business use of internet and web.... usiness people along with their customers, will own a significant number of wireless devices such as tablets, smartphones, wireless pocket PCs among others....
2 Pages (500 words) Coursework

LAN Computer Platform

wireless LAN and added superior LAN hardware choices are also available.... The paper discusses the computer platform “LAN” in detail.... It explains how a LAN computer network can be organized and execute.... The paper analyzes the various aspects of the LAN and it compares various operating systems that can be implemented on the LAN … Everybody engaged with local area networking has a fundamental considerate of network wiring and cabling....
15 Pages (3750 words) Essay

Rolland's Manufacturing Company-The Potential Impact of Securing a Supplier Contract

A paper "Rolland's Manufacturing Company-The Potential Impact of Securing a Supplier Contract" has been prepared for Rolland's Board on the implications of becoming a Wal-Mart supplier over the next five years, and effective strategies for becoming a “world-class” manufacturer have been discussed....
13 Pages (3250 words) Research Paper

Home Automation Using Wireless Sensor Networks and Biosensors

The paper “Home Automation Using wireless Sensor Networks and Biosensors” seeks to evaluate home automation, which refers to the use of systems that use different technologies to equip parts of the home with a more intelligent monitoring and remote control.... These protocols usually operate over power line infrared or radiofrequency wireless communication technologies.... he emerging technology, wireless Sensor Network (WSN), which is a wireless network, consisting of a potentially large set of small and smart sensor nodes equipped with a processing unit, storage capacity, and sensing unit for sensing physical phenomena....
14 Pages (3500 words) Research Proposal

Comparison Research between Two Types of Wireless Transmission: Wi-Fi and Li-Fi

This paper is about  the comparison research between two types of wireless transmission: Wi-Fi and Li-Fi.... nbsp;… From a theoretical perspective, wireless fidelity (Wi-Fi) is defined as a renowned wireless networking based technology, which fundamentally executes radio waves for offering high-speed internet as well as networking connections to the end users.... On the other hand, light fidelity (Li-Fi) is described as a wireless optical based technology, which typically utilises light-emitting diodes for transmission of data (Paul & Sharma, 2014)....
12 Pages (3000 words) Research Paper

Analysis of Internet Protocol Telephony

hellip; The report will now establish and discuss the implementation of WLAN security measures through the use of segmentation devices in the mitigation of exposure risks through the reduction of potential individual failure points, isolation, and control of internal access of WLAN connectivity services.... According to Valentine and Whitaker, the main ways used in applying security to WLANs are three....
14 Pages (3500 words) Literature review

The Challenges in the Internet of Things

BackgroundGiven that the nodes of IoT are of low communication speed, less computation power, low storage, and naturally heterogeneous, it requires forward and backward secrecy, smooth control of the data access, confidentiality, integrity, and scalable security algorithms.... The phrase 'security' normally involves different concepts; for instance, security connotes the basic security services provision, which involves availability, confidentiality, non-repudiation, authorization, integrity as well as authentication....
16 Pages (4000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us