StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Security Issues in Wireless Mobile Communication - Coursework Example

Comments (0) Cite this document
Summary
This coursework "Security Issues in Wireless Mobile Communication" describes Wireless mobile communications. This paper outlines that wireless mobile communications are becoming essential in daily lives and its application is in a number of areas, their benefits and threats. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Security Issues in Wireless Mobile Communication
Read Text Preview

Extract of sample "Security Issues in Wireless Mobile Communication"

Download file to see previous pages There is a need to inform users of mobile devices about the security issues they face without making them afraid. People must know the use of these devices properly so as not to be a victim of security vulnerabilities. Mobile operators must ensure that data transmission is secure and private so as to security issues coming up.
To the users and service providers, security is a significant issue in mobile communications. Mobile communication systems are vulnerable to security threats since vital information can be shared across the network. In wired communication, the transmission of information is more secure since their medium of transmission is a fixed-line. On the other hand, wireless mobile utilize the air to transmit information, the data can thus be easily accessed by unauthorized persons. It makes the wireless nature of mobile communications problematic. Security issues and privacy is becoming more outstanding with wireless mobile networks. The security threat in the wireless mobile communication systems utilized by these organizations will definitely have an impact on their operations. For example, it may lead to vital information leaking and getting into the wrong hand. Malicious persons also take advantage of the network to hack into the system and gain access to steal information. For that reason, control measures must be undertaken to counter this trend (Rhee, 2009).
A wireless mobile network is made up of components that ensure information is transmitted from the sender of a message to the intended receiver. The first component is MS (mobile station) which is a terminal made up of equipment customers of a communications service provider utilize to transmit information using a network. He or she connects with a network that is within a range using a mobile device like a phone. A mobile service communication provider ensures that its network coverage reaches the clients area and is strong enough to ensure that communication is not interrupted.  ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Issues in Wireless Mobile Communication Coursework Example | Topics and Well Written Essays - 1750 words, n.d.)
Security Issues in Wireless Mobile Communication Coursework Example | Topics and Well Written Essays - 1750 words. https://studentshare.org/information-technology/1880652-wireless
(Security Issues in Wireless Mobile Communication Coursework Example | Topics and Well Written Essays - 1750 Words)
Security Issues in Wireless Mobile Communication Coursework Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1880652-wireless.
“Security Issues in Wireless Mobile Communication Coursework Example | Topics and Well Written Essays - 1750 Words”. https://studentshare.org/information-technology/1880652-wireless.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security Issues in Wireless Mobile Communication

Wireless Security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... SECURITY Wireless Security affiliation Table of Contents TECHNOLOGY INVOLVED IN WIRELESS NETWORKS 4 WIRELESS TECHNOLOGY:FUTURE TRENDS 5 COMPANIES INVOLVED IN WIRELESS TECHNOLOGY 7 REGULATORY ISSUES IN WIRELESS NETWORK 8 Piggybacking 8 Wardriving 9 Unauthorized Computer Access 9 Evil Twin Attacks 9 Wireless Sniffing 10 Shoulder Surfing 10 WIRELESS SECURITY MANAGEMENT 11 Wireless Network should be Invisible 11 Wireless Network should be renamed 11 Network Traffic should be encrypted 12 Administrator Password should be Changed 12 Online Awareness 12 Connect Using a VPN 13 Disable File Sharing 13 CONCLUSION 14 REFERENCES 14 INTRODUCTION Wireless...
12 Pages (3000 words) Research Paper

Wireless security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... of Attackers There are many types of attackers, which intend to harm the networks. Some of the most famous types of attackers include hackers, crackers, script kiddies, spies, employees, and cyber terrorists. Selected Attacker Of all these six types of attackers, the one, which I would like to break into my network, is a hacker. The reason is that hackers break into the networks to identify the security holes present in the networks. The aim of the hackers is not to commit theft, destroy, or steal any sort of private information; rather the intention is to make the network administrators improve the security of their networks. Ciampa (2009)...
2 Pages (500 words) Essay

Wireless Security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... Wireless Security Introduction Recently, wireless networking has become more affordable, available and easy to use. Wireless technology is becoming more common especially in homes where it has been greatly adopted. A wireless network involves the access of internet by computers without using any cables or wires. This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (Onguardonline.gov, 2012). Wireless local area...
7 Pages (1750 words) Research Paper

Mobile and wireless computing

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... Mobile and wireless computing Mobile and wireless computing The main two reason challenging development of softwares for wireless devices are the platforms and the size of the deployment that the developer is aiming (B'Far, 2005). These factors can be translated to simply; number of competing standards for application development on various devices and adaption of software applications to match the requirement. Let’s begin with competition within application standards of development on various devices; for a long time Nokia group using Symbian OS has dominated in this field but not anymore, there is a lot of competition from iOS, Android, HP...
3 Pages (750 words) Essay

Mobile computing and wireless communication

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... Introduction We have come a long way since the days of the valve and ENIAC computer. The irrepressible Integrated Circuit (IC) family happens to be the key ingredient in this revolution. Recent advances in mobile computing [1] and wireless communication are the focus of study for this paper. The mobile instruments are now coming in a range of shapes and sizes with features adding up day by day, thanks to the continuing trend towards integration of more and more electronic circuits. This trend of miniaturizing Integrated Circuits has led to the availability of low-power embedded processors and radios as well, further strengthening the...
10 Pages (2500 words) Essay

Wireless Security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides. Bluetooth and...
15 Pages (3750 words) Essay

Mobile and Wireless Security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... head: MOBILE AND WIRELESS SECURITY Mobile and Wireless Security ------------------------------------- Mobile and WirelessSecurity With awareness of the current trend of merging the phone and the PDA answer the following questions:- Q1. What risks do you see these having for corporate data A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular. Since all these devices work on wireless media, obvious vulnerabilities exis...
5 Pages (1250 words) Essay

Wireless security

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the inte...
2 Pages (500 words) Essay

Wireless and Mobile Technologies

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... Study 2: Wireless and Mobile Technologies Case Study 2: Wireless and Mobile Technologies Thecompetitive climate in the commerce industry prompts companies to research on valuable ways to connect with the target customers. Computing has become undeniable option where firms can use mobile and wireless technologies to attract and retain customers. Wireless and mobile technologies are used for a variety of ways to boost business efficiency and organization implement or install important systems for both wireless and mobile technologies functions. One of the leading firms in the use of the technologies is the Delta Airlines. The primary objective of ...
5 Pages (1250 words) Case Study

Wireless and Mobile Technologies

...Security Issues in Wireless Mobile Communication... Security Issues in Wireless Mobile Communication... and Mobile Technologies Wireless technologies are communication signals that are sent without the use of cables or wires. This includes cellular communication, the use of wireless computer accessories, networking between computers and wireless adapters (Information Resources Management Association, 2012). The wireless technologies make use of electromagnetic waves to aid the transfer of communication signals via the air (Kyriazakos, Soldatos, & Karetsos, 2008). Mobile technologies, on the other hand, refer to technological devices that are movable, most of which are wireless. One of the ways that organizations use wireless technologies to impro...
3 Pages (750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Security Issues in Wireless Mobile Communication for FREE!

Contact Us