Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Mobile and Wireless Security - Essay Example

Comments (0) Cite this document
A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Mobile and Wireless Security
Read TextPreview

Extract of sample "Mobile and Wireless Security"

Download file to see previous pages and Dasgupta, P., 2003).
An attacker can easily connect to the wireless network using wireless media and create a separate access point for provisioning of service to the network users. Users are forced to route traffic through the rogue access point where the attacker can either sniff information or even alter or destroy it (Godber, A. and Dasgupta, P., 2003). The attacker can attach viruses to downloads and infect the user devices. Thus the wireless networks are required to be secured from such attacks.
A2. Increased usage of mobile devices by the work forces in corporate calls for implantation of security measures in wireless networks. The vulnerabilities of a wireless network are required to be overcome to prevent attacks in the form of eavesdropping, spoofing etc, resulting in loss or compromise of sensitive data. Thus there exists a requirement to formulate and implement a wireless security policy to disallow unauthorized access to the corporate networks using wireless media and allow only approved and authenticated users to be connected. IPsec VPN provides an easy and robust solution by incorporating tunneling, strong authentication and encryption procedures.
The aim of the policy is to lay down standards for establishment of wireless connection from remote location to the XYZ corporate intranet. The policy also gives out detailed system requirements to be in place before the remote user is actually allowed access to the corporate resources. This remote access policy is designed to prevent damage to the corporate network or computer systems and to prevent compromise or loss of data. The policy details are as under:-
The remote user shall connect using virtual private networking (VPN). VPN is a private network providing services to selected or authorized group. The network is 'virtual' as it builds on public physical networks by tunneling through it (Qu, Wie and Srinivas, S., 2002). VPN services are classified as LAN interconnect, dial-up and extranet (Venkateswaran, R., 2001). VPNs can be implemented at network or data link layer.
Client Check
The wireless network should be segregated from the intranet by employing a front-end firewall with the intranet. Firewall restricts broadcast traffic and saves STAs and APs from the intranet users.
Anti-virus software must be installed and operational.
Ensure that the client satisfies the set criteria else deny access or allow only limited access to the extent that he can access required software to meet the requirement.
Connection Type. STAs should get connected to the corporate protected intranet through APs after IPsec VPN authentication (Weber, Chris and Bahadur, Gary, 2002) (For wireless IPsec VPN, the basic components are wireless clients or stations (STA) and a wireless access point (AP). APs act like hubs that connect to the STAs and provide pathway from wireless network to other existing network.).
IPsec authentication between STA and intranet should be done using Kerberos or client ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from
(Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 Words)
“Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Mobile and Wireless Security

Wireless Security

On the other hand, there are countless security and privacy issues also emerging in wireless networking environments. Though, the new technologies require more and more high level application of wireless communication networks, but such implementations are being established without giving significant concentration to privacy and security related issues. Consequently, the majority of wireless networks around the world are in danger regarding security and safety. Thus, there are a lot of chances that someone with appropriate equipment could be able to spy network traffic. In this scenario, they can get access to users’ passwords and other data (Gerkis, 2006; The State University of New Jersey, 2006).
In addition, these securit...
12 Pages(3000 words)Research Paper

Wireless security

... and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources to access the network based on the authentication of the person who wants to access the network. Using...
2 Pages(500 words)Essay

Wireless and Mobile Computing

... and wireless Internet. On the business vendor side, the applications’ complexity supported by tablets, handheld PCs, and PDA s by use of wireless LAN as well as data synchronization technologies registers a constant increase. Browsers will continue to register a significant growth, supporting computation applications via the LAN technology, since this solution accomplishes the data access, data security requirements, and response time. According to the records of about eight years ago, wireless LAN transmits data at 7 Mbs versus the LAN’s 10 to 100 Mbps. Browsers are improved to ensure that data transfer between the application server and the handheld devices. Conclusion Wireless communication supports data transmission between the mobile...
5 Pages(1250 words)Research Paper

Wireless Security

This method is convenient because one can work from anywhere in the house or in his business using his or her laptop. It also makes it possible to connect various computers to the internet, which does not require the use of many disorganized wires or cables as can be in wired networks (, 2012). Wireless local area networks (WLANs) have become explosively popular, which have dramatically altered the way in which people access data, surf the internet and read their e-mails. WLANs are now everywhere in libraries, coffee shops, hotels, airports, college campuses, and many other public places. WLANs initially became accessible in 2000 and since then, they have deeply penetrated into people’s everyday lives, becoming w...
7 Pages(1750 words)Research Paper

Mobile and wireless computing

...? Mobile and wireless computing Mobile and wireless computing The main two reason challenging development of softwares for wireless devices are the platforms and the size of the deployment that the developer is aiming (B'Far, 2005). These factors can be translated to simply; number of competing standards for application development on various devices and adaption of software applications to match the requirement. Let’s begin with competition within application standards of development on various devices; for a long time Nokia group using Symbian OS has dominated in this field but not anymore, there is a lot of competition from iOS, Android, HP webOS, BlackBerry, Window Mobile and Bada from Samsung (Mehdi Khosrowpour, 2006). This is a big...
3 Pages(750 words)Essay

Wireless Security

...Running head: WIRELESS SECURITY Wireless Security Goes Here al Affiliation Goes Here Wireless Security Introduction A wireless LAN (wireless network) is a network without wires. Wireless network's use radio frequencies as their transmission media, sending network traffic sailing over the air. It is a flexible data network system applied as an extension to, or as an alternative for a wired LAN. The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides. Bluetooth and Wi-Fi--two of the hottest wireless technologies--can provide businesses with enhanced connectivity...
15 Pages(3750 words)Essay

Wireless security

...Wireless Security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology. Along with many users moving to the wireless medium , the development and growth of the technology being employed is exponential. It has reached a point where the user can communicate, connect and perform his desired action from anywhere employing the use of wireless technology for example Wi-Fi,Wi-Max etc. The main usage today of wireless technology is for the usage of internet so much that both have become interoperable. The activities performed by user on the internet can be both casual and confidential in nature. None the less for any...
2 Pages(500 words)Essay

Wireless and Mobile Technologies

.... Customers get information through smartphones and social media on how to book tickets and catch next flights. Mobile and wireless technologies are used to keep production or service provision problems in check (, 2015). Firms churn out products or offer services without any gross errors. The security and safety of Delta customers depend on how well they can track their luggage and baggage during the flight. Installation of a Wi-Fi system where customers can track the baggage using innovative features has reduced the burden of handling discrepancies in the airline. Wireless and Mobile Technologies That Delta Has Implemented Delta provides in-flight branded recharging stations in 19 airports for all passengers. The stations...
5 Pages(1250 words)Case Study

Wireless and Mobile Technologies

...Wireless and Mobile Technologies Wireless technologies are communication signals that are sent without the use of cables or wires. This includes cellular communication, the use of wireless computer accessories, networking between computers and wireless adapters (Information Resources Management Association, 2012). The wireless technologies make use of electromagnetic waves to aid the transfer of communication signals via the air (Kyriazakos, Soldatos, & Karetsos, 2008). Mobile technologies, on the other hand, refer to technological devices that are movable, most of which are wireless. One of the ways that organizations use wireless technologies to improve business efficiencies is by the development of mobile and computer applications...
3 Pages(750 words)Case Study

Implications of Mobile Communication on Society

Lifestyle has changed and the mobile phone is gradually becoming a part of the culture of modern societies (Hulme & Peters).
Voice transmission is no longer the only way that mobile phones are used. It is a multi-purpose device. Mobile phone networks have become a new platform through which data, information and transactions are exchanged. It serves as an alarm clock, an address book, an entertainment device through games, and to a text message.
At the end of 2003, there were 1.35 billion mobile subscribers worldwide compared to 1.2 billion fixed line users (Shaping the Future Mobile Information Society). It has undoubtedly changed the lives of the people and the biggest factor which induces the purchase of mobile ph...
6 Pages(1500 words)Essay

Web Presentation: Mobile Learning

The field of mobile learning rapidly increases during the 1990s and early 2000s. Aiming to reduce the illiteracy gap among the young citizens who are not succeeding in school, the European Commission has extended financial support with as much as €4.5m for a three-year pan-European research and development program form-learning.3
Over the years, the quality and efficiency of the Internet, as well as the emerging Information Communication Technology (ICT) infrastructure, has improved a lot. The increase in the supply of mobile learning pieces of equipment eventually resulted in a decline in the costs of online learning experience throughout the private and government industries including institutions like schools, etc. Th...
10 Pages(2500 words)Assignment

The Popularity of Mobile Phone Marketing

The marketers of today should have a hawks eye on any new marketing trends and issues so that they can be adopted and addressed respectively and so that they benefit the marketing activities of the product to the maximum possible.
The current issues in marketing are those which have not been that prevalent/popular or even existent a year ago, and this is where the need for a spotlight on them arises. Marketers in the making need to have a close look at these current issues so that they can incorporate them into their marketing practices when they step into practical life. Not just those in the making, but it is essential for currently established marketers to be flexible for these current issues so as to provide the best mark...
10 Pages(2500 words)Term Paper

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages(1500 words)Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages(2250 words)Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages(1500 words)Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages(2500 words)Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages(1500 words)Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages(1750 words)Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages(2000 words)Case Study

Designing a Wireless Communications and Computing Network System with Wireless Security and Smart Mobile Antenna Technology

...DESIGNING A WIRELESS COMMUNICATIONS AND COMPUTING NETWORK SYSTEM WITH WIRELESS SECURITY AND SMART MOBILE ANTENNA TECHNOLOGY FOR A HOTEL WITH GARDEN AND CAR PARK Course Name: Code: Name: Submitted to: Abstract This work envisaged designing a wireless communications and computing network system with wireless security and smart mobile antenna technology for a hotel with garden and car park. A thorough study of the area is made and relevant data is gathered. Subsequently, a discussion on the planning and engineering process that can be used to design a microcellular radio system was made. A discussion on the problem areas those are associated with microcellular systems was made. Subsequently a comparison was provided between cell reuse...
17 Pages(4250 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Mobile and Wireless Security for FREE!

Contact Us