Chapter two introduction to basic concepts

Chapter two introduction to basic concepts - Chapter 102...

Info icon This preview shows pages 1–2. Sign up to view the full content.

Chapter 102 Introduction to Basic Concepts and Considerations of Wireless Networking Security 1. Local networks have been, from the beginning, a controversial topic. 2. The organizations that have implemented these types of networks have shown their concern about their levels of security. 3. Some of those efforts have contributed towards the study of wireless security. 4. Other efforts have failed , presented a different group of vulnerabilities, or require expensive proprietary software and hardware. 5. Finally, other efforts try to mitigate the problem piling up a complex group of security technologies, like virtual private networks. 6. Despite the benefits they bring, a great number of concerns related to security have limited the massive adoption of wireless networks, particularly in sectors that are highly aware of the existing security risks such as the financial and government sectors. 7. Even though there are a significant number of risks inherent to the mass transmission of data to any individual within the boundaries of a wireless network, a good amount of these are installed without any security measure at all. 8. However, the majority of businesses that have implemented some sort of wireless security measures have done so in the most rudimentary way, bringing a false sense of security to users. 9. When the first IEEE 802.11 wireless standards were in the phase of development, security was not as important as it is today. 10. The level of complexity of network threats was much lower and the adoption of wireless technologies was still in an introductory phase. 11. It was under these circumstances that the first standard for wireless network security, known as wired equivalent privacy (WEP), was originated.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 2
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '13
  • MichelleBarnes
  • Wireless Networks, Computer network, Wireless network, Wireless security

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern