.

Friday, April 26, 2019

Comparing And Contrasting Wireless Security Essay

Comparing And Contrasting Wireless Security - Essay ExampleYet, as recent events father shown, this wall is at best overstated and at worst illusory altogether. Regardless, radio set security is no longer a concern for only the home and business. As tuner access points grow in popularity, in that location is a growing need to secure networks that are designed to be used by members of the open. As Chenoweth, Minch and Tabor (2010) point out, these networks offer little or no security for the end user, which is a completely different problem, but related in the potential consequences of misuse. Finally, Potter (2006) believes that achieving true security at one of these public networks is impossible and that Laptops and PDAs are so vulnerable in wireless hotspots, users would do healthy to turn them off (p. 51). The views of wireless security that those authors cut into are separable into two different sets of categories. First, the authors every give an optimist/descriptive vie w or a pessimist/normative view of how end users should interact with wireless technology given security concerns. water closet (2008) witnessed the breach in internet security at a U.S. credit card processing center (a descriptive view) and wrote about how users can protect themselves. On the another(prenominal) hand, Chenoweth, Minch and Tabor (2010) and Potter (2006) described how there is virtually no security on wireless networks (a demoralized view) and that users might be better off not using them (a normative view). Second, the authors give either an estimate of buck private home or business wireless security or an account of public hotspot wireless security. Once again, while water closet (2008) is writing primarily about private end users operating their own private networks, Chenoweth, Minch and Tabor (2010) and Potter (2006) are discussing networks in the context of public hotspots, as opposed to private channels. Seeing the literature in this bearing, one might real ize that there is a certain consistency at work from the time between 2006 and 2010, little advancements have been make in improving the wireless security for public networks. Meanwhile, private networks remain potentially unprotected, but that the weakest unite in that chain is the end user, not the network itself as seems to be the case with public wireless hotspots. From this perspective, one can begin to put into context the kind of advice or observations that each article makes. Loo (2008) opens his discussion of private network wireless security by overviewing why end users are the weakest components in a computer systems security. He writes, In most systems, the weakest components are the end users, peculiarly when they are accessing the corporations databases with wireless facilities at home (p. 68). Of course, what he is suggesting here is that corporations must fortress their information from private individuals because, although those private individuals may think thei r connection is secure, it may be the easiest access way that an outsider has to gain access to the sensitive information contained within a corporations network. Loo (2008) dispels some of the myths above this private security, including the common public opinion that home computers are not attractive to hackers. However, this belief is false considering the increasingly digitized way that individuals share knowledge and communicate. Not only

No comments:

Post a Comment