StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Mobile and Wireless Security - Essay Example

Cite this document
Summary
A1. PDA is a mobile handheld device possessing all the capabilities of a desktop PC. Cellular phone provides telephony and short messaging services with added facilities like web-browsing, video, camera etc. Smartphone is device, which combines both, and is thus becoming fast popular…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Mobile and Wireless Security
Read Text Preview

Extract of sample "Mobile and Wireless Security"

Download file to see previous pages

and Dasgupta, P., 2003). An attacker can easily connect to the wireless network using wireless media and create a separate access point for provisioning of service to the network users. Users are forced to route traffic through the rogue access point where the attacker can either sniff information or even alter or destroy it (Godber, A. and Dasgupta, P., 2003). The attacker can attach viruses to downloads and infect the user devices. Thus the wireless networks are required to be secured from such attacks. A2. Increased usage of mobile devices by the work forces in corporate calls for implantation of security measures in wireless networks.

The vulnerabilities of a wireless network are required to be overcome to prevent attacks in the form of eavesdropping, spoofing etc, resulting in loss or compromise of sensitive data. Thus there exists a requirement to formulate and implement a wireless security policy to disallow unauthorized access to the corporate networks using wireless media and allow only approved and authenticated users to be connected. IPsec VPN provides an easy and robust solution by incorporating tunneling, strong authentication and encryption procedures.

The aim of the policy is to lay down standards for establishment of wireless connection from remote location to the XYZ corporate intranet. The policy also gives out detailed system requirements to be in place before the remote user is actually allowed access to the corporate resources. This remote access policy is designed to prevent damage to the corporate network or computer systems and to prevent compromise or loss of data. The policy details are as under:-The remote user shall connect using virtual private networking (VPN).

VPN is a private network providing services to selected or authorized group. The network is 'virtual' as it builds on public physical networks by tunneling through it (Qu, Wie and Srinivas, S., 2002). VPN services are classified as LAN interconnect, dial-up and extranet (Venkateswaran, R., 2001). VPNs can be implemented at network or data link layer.Client CheckThe wireless network should be segregated from the intranet by employing a front-end firewall with the intranet. Firewall restricts broadcast traffic and saves STAs and APs from the intranet users.

Anti-virus software must be installed and operational.Ensure that the client satisfies the set criteria else deny access or allow only limited access to the extent that he can access required software to meet the requirement.Connection Type. STAs should get connected to the corporate protected intranet through APs after IPsec VPN authentication (Weber, Chris and Bahadur, Gary, 2002) (For wireless IPsec VPN, the basic components are wireless clients or stations (STA) and a wireless access point (AP).

APs act like hubs that connect to the STAs and provide pathway from wireless network to other existing network.).Authentication.IPsec authentication between STA and intranet should be done using Kerberos or client

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/miscellaneous/1534538-mobile-and-wireless-security
(Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/miscellaneous/1534538-mobile-and-wireless-security.
“Mobile and Wireless Security Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/miscellaneous/1534538-mobile-and-wireless-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Mobile and Wireless Security

Wireless and Mobile Computing

Wireless Internet A publication by Amjad Umar, Mobile Computing and wireless Communications presents a discussion, that wireless internet (wireless Web) supports access data though mobile computing through the internet and particularly equipped handled devices.... According to the work, wireless and Mobile Computing by Turisco and Joanna, the term wireless is the term used in computer networking and data communication, to refer to the underlying computer technology, which supports data transport between the mobile device of computing, and the main system computer without the implementation of a wired connection....
5 Pages (1250 words) Research Paper

The Mobile Operating System

The paper “the mobile Operating System” seeks to explore the mobile industry, the fastest evolving segment both technologically and economically.... hellip; The author explains that the operating system of the mobile phone is the key to all functional aspects and user satisfaction.... mobile phones today are used for personal and professional purposes.... mobile phones today are used for personal and professional purposes....
8 Pages (2000 words) Dissertation

W4-Policy, Team, and Information Technology Differences

This essay declares that designing a new set of information systems for an organization is a real challenge in today's highly complex and diverse manner in which most companies operate, trying to maximize on customer satisfaction and enhancing profits.... hellip; According to the report companies constantly lay emphasis on smoothing several areas of work and emphasize the need to streamline organizational policies and procedures such that every individual responsibility within an organization can be performed in a clear and concise fashion using the least possible resources, effort and time....
7 Pages (1750 words) Essay

Information Systems: What We Do With It

The above featured facts reiterate that User acceptance is no longer a major barrier to wide use of wireless information system and wireless information technology finds its name as common and inevitable starting from households to high tech internet... Some of the areas where there is dominance of wireless information system are speech, e-mail, Net surfing and transmission of video… Mobile telephony is one such application gaining more momentum.... wireless networks are also used to establish the communication link between computers. It is an acceptable fact that “User acceptance is no longer a major barrier to wide use of wireless information A wireless information system is widely used at all levels not only because of the advantage of easy mobility in the telecommunications environment without the hassle of connecting wires across the equipment....
3 Pages (750 words) Research Paper

Wireless Technology

It represents the wireless mobile technology, which undoubtedly has many advantages in comparison with the previous generations of communications.... Secondly, wireless technologies is more simple in usage that traditional wire channels.... 3G technology interacts with IP networks, mobile devices....
3 Pages (750 words) Essay

Type of Wireless Technologies

Wireless technologies face some controversies especially in security.... ireless technologies have become common because of their convenience and cost-saving for individuals and businesses but there is a need to get solutions to the security issues that come with these technologies, to gain more popularity among skeptics.... The paper "Type of wireless Technologies" discusses that it is evident that wireless technologies are of great importance to the modern world....
9 Pages (2250 words) Essay

The Security Mechanism for IEEE 802.11 Wireless Networks

This case study "The security Mechanism for IEEE 802.... 1 Wireless LAN's security mechanisms.... nbsp;They have recently become so popular due to their ability to provide mobility, flexibility and security.... 1 architecture can be used to employ security to the wireless networks.... 1 security mechanisms are the first and most effective and reliable ways to secure wireless networking.... 1 Wireless LAN's security mechanisms....
10 Pages (2500 words) Case Study

Security Issues in Wireless Mobile Communication

This coursework "security Issues in Wireless Mobile Communication" describes Wireless mobile communications.... nbsp;… An area of interest is in the security threat that comes up as a result of wireless mobile communication technology.... nbsp; There is a need to inform users of mobile devices about the security issues they face without making them afraid.... People must know the use of these devices properly so as not to be a victim of security vulnerabilities....
7 Pages (1750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us