Introduction
Technologies are all around us. Its introduction gave way the people its freedom to access and communicates to different people at home or in the business. The wireless network created a different dimension of reaching the things in just one click. But in just a click, the danger can also be produced. The recognized danger created the disadvantage perspectives for most of the users and the difficulty to prevent some system attacks bound different providers to craft an adequate solution.
Background of the Study and Problem Statement
Wireless networking is under the standard that suits the Wi-Fi technology which is also the most common device for both home and businesses (Cunningham and Grout, 2008). The communication devices plays vital role and this is not an exemption in the presence of any threats. In the continued use of the Wi-Fi services and technologies, what are the security measures that can be implemented?
Research Objectives
The objectives of the study are firstly focused on the security measures that can be applied in the protection of the technologies from the unwanted misuse of the technology features. Secondly is the adaptation of the basic security or restricted access to the wireless networks. And thirdly is to employ further studies on software that will lead to the more detailed information regarding the security mechanisms. All of the incorporated enclosed in the study are assumed to promote the continuous development of various security measures.
Research Questions
The study provided several questions that will help the entire research in determining the security measures in the wireless networks
· What are the features of an ideal security to the wireless networks?
· What are reactions of the people in the services offered by the security features?
· Is the application of the security measures is effective in terms of protection?
Literature Review
Wireless networks are unprotected and leaving users vulnerable to identity theft and loss of irreplaceable documents (McAfee Inc., 2005). The threats in the networks technologies became popular and addressing the security measures in the Wi-Fi networks. Securities are a very vital issue in the field of information technology and processing (Fordham and Roof, 2008). The residential and business have an increasing demand for the wireless networking and along the way, this contributes to the need for security that is commonly large depending on the number of access points. The extensive work of the networks results to the traffic of information and service utilization. In this case, the capability of the network to deploy the information in different wireless settings is also in the matter of security. Basically, the security is applied to the users of the wireless networks and it is difficult to cover the large demographic areas. Considering the deployment of security on home and business, there should be a certain security mechanism in attempt to derive the correlations between the density and grouping of the access points. In the employment of the wireless networks, it can be assumes that Wi-Fi is commonly put in place to provide ease of access from various locations around the home, rather than because it is easier to network a number of computer systems together (Cunningham and Grout, 2008). The idea of network security can provide the industry of wireless communication the standard and automatic protection against the data theft and unauthorized network access. In addition, the encryption can close the personal information of the users thus protecting the identity of the personal users and financial information for the business. The anti-virus and firewall software is a comprehensive idea for protection as well as the automatic detection of the internal threats (McAfee Inc., 2005).
Research Method
The applied method in the study is the case study review method. Through this method the expected results can be achieved. The review method allows the study to examine the applied security measures on the wireless networks. In the further analysis, the security services can be determined and answer the main problem within the wireless networks.
Expected Results
There is an enormous growing number of people using the wireless networks and being aware about the need for security. As the result, there is a more effective protection in employing a combination of security technique is advisable such as the idea of filtering and encryption.
Schedule of Activities
The scheduled encryption can be dome as the rotation of activities to prevent the attacks of the intruders in the system. Many organizations experienced the acts of hacking in most their private files and the home networks are experiencing the crashing of their systems due to different threats, such as unwanted programs or illegal use of the identity of the other person.
References:
Cunningham, S., & Grout, V., 2008. Peace Driving: Case Studies of Wi-Fi Usage. [Online] Available at: http://www.glyndwr.ac.uk/cunninghams/research/SEIN_wifi.pdf. [Accessed 05 Feb 2010].
Fordham, D., & Roof, B., 2008. Test Your Information Security IQ. Journal of Accountancy, Vol. 206, No. 1.
McAfee Inc., 2005. McAfee Wireless Home Network Security: Proven Security that Protects your Home Wi-Fi Network. Data Sheet of Consumers Security Solutions. [Online] Available at: http://download.mcafee.com/products/manuals/en-us/MWL_DataSheet_2006.pdf. [Accessed 05 Feb 2010].
No comments:
Post a Comment