Wireless Technology Security Concept Paper
American Military University
Intrusion Detection and Incident Handling
Dr. David Andersson
Wireless Technology Security
Wireless technology is an industry that is growing exponentially. For every new and existing product, there is a want/need and expectation that the product will someday be available to use wirelessly. The only obstacle is the time it takes to advance the technology to become wireless.
This wireless movement has been fueled by the rise and advancement of the cellular phone. Before cellular phones were common in personal and business use, a person had to be in a specific place at the time a call was placed to receive the phone call or message. Cellular phones gave the user to the ability to make and receive calls at any location. The first truly portable cellular phone was sold by Motorola in 1983, costed $3,900, was bulky, and could only place and receive basic phone calls (marwalla, 2010). This was impractical for most consumers and businesses at the time. However, innovation and advances in technology allowed manufacturers to continuously improve all aspects of the cell phone. Cell phones became “smarter”, packing more features into a smaller space and becoming increasingly affordable. The correlating evolution of broadband wireless internet and cellular data network have also attributed to the advancement.
Today, cellular phones have a graphical user interface, touchscreens, high-speed data connections, and applications that help the user achieve almost any task (Smith, 2015). Smartphones are becoming more commonly known as “mobile devices”. This is due to the fact that being a phone is now only a small part of the ...
... middle of paper ...
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond Intrusion Detection. Boston: Addison-Wesley Professional.
Growing Importance of Mobile Devices in Business [Infographic]. (2014, October 10). Retrieved from CPC Strategy: http://www.cpcstrategy.com/blog/2014/10/mobile-devices-infographic/
Ruggiero, P., & Foote, J. (n.d.). Cyber Threats to Mobile Phones. US CERT. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
Smith, A. (2015, April 1). U.S. Smartphone Use in 2015. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/
The History And Evolution Of Cell Phones. (n.d.). Retrieved from The Art Institutes: https://www.artinstitutes.edu/blog/the-history-and-evolution-of-cell-phones
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Mobile security, also called wireless security, refers to the protection of laptops, tablets, and smartphones, other computing devices as well as the networks they connect to from vulnerabilities and threats which are related to wireless computing. Mobile security is a broad term that entails several issues such as protecting a mobile device from malware threat, reducing risks and also securing the mobile device and its data in the incidences of theft, accidental loss of the device or unauthorized access.... [tags: Security, Computer security, Information security]
1126 words (3.2 pages)
- Survey of Wireless Computing Abstract Wireless technology can provide many benefits to computing including faster response to queries, reduced time spent on paperwork, increased online time for users, just-in-time and real time control, tighter communications between clients and hosts. Wireless Computing is governed by two general forces: Technology, which provides a set of basic building blocks and User Applications, which determine a set of operations that must be carried out efficiently on demand.... [tags: Wireless Technology Networks Computers Essays]
4792 words (13.7 pages)
- In this essay we will present security issues of a networking concept referred to as ambient networks, which aims to enable the cooperation of heterogeneous networks belonging to different operator or technology domains. In this way, it appears as homogeneous to the users of the network services. Providing security in ambient networks is a huge challenge. The main reason is that the traditional security model is not valid anymore. Traditional security assumes that there is a vulnerable channel between communicating parties, where eavesdropping, modification of messages or denial of service attacks can occur.... [tags: Ambient Network Security, AmI]
2184 words (6.2 pages)
- Energy awareness for computation and protocol management is becoming a crucial factor in the design of MANET protocols and algorithms. Because of mobility, we need the support of scalable routing strategies and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce fake neighbor position for route discovery. Often energy saving and path duration and stability can be two contrasting efforts and trying to satisfy both of them can be very difficult because such a process can be easily abused or disrupted by adversarial nodes.... [tags: neighbor, communication, attacks]
1437 words (4.1 pages)
- User authentication by one of its many definitions is “a process that allows a device to verify the identity of someone who connects to a network resource” . There are a number of methods set in place for Windows 7 to authenticate users. Authentication protocols, setting up strong passwords, implementing multi-factor authentication and biometrics are all examples of methods that Windows 7 implements. Unfortunately, with any security measure comes a security threat. Some protocols on Windows system have vulnerabilities within them that compromise their effectiveness.... [tags: Authentication, Password, Security token]
2398 words (6.9 pages)
- The design of WSN includes various disciplines like database, query processing, networking, algorithms and distributed systems. The basic functionality of WSN generally depends on the applications but the following requirements are typical. I) determine the value of a parameter at a given location. II) Detect the occurrence of events of interest and estimate the parameters of the events. III) Classify the object that has been detected. IV) Track an object. Sensing principles include mechanical, chemical, thermal, electrical, chromatographic, magnetic, biological, fluidic, optical, ultrasonic, and mass sensing.... [tags: database, query processing, networking]
723 words (2.1 pages)
- A big potential problem in the future is developing a wireless communications network in outer space. In this paper we will discuss the problems presented with this and the potential solutions to these problems using existing and some futuristic technology. We have broke this into two main parts, one being earth to satellite to planet and back, and the other being planetary ground transmission to and from astronauts to rovers to space stations. The solution has already started being implemented and will continue rapidly into the near future.... [tags: Science Outer Space Communication Satellite]
2524 words (7.2 pages)
- ... One interesting example application of 6LoWPAN is in facility management, which is the management of large facilities using a combination of building automation, asset management and other embedded systems. The devices in the 6LoWPAN network need to have a appropriate routing mechanism in order to be able to route keeping in mind the constraints in the devices such as memory and power. The protocols should try to minimize the energy usage and improve the lifetime of the entire network. When the concept of link quality is combined with the routing protocols the lifetime of the network is always greatly enhanced.... [tags: IP-based application, internet of things]
1744 words (5 pages)
- Abstract: At this point in time the ubiquity of personal and sensitive information of businesses and individuals who participate in the world economy is greater than ever. As in the past, your information could be found on an old credit card statement inside your garbage can at the end of your driveway; just waiting to be plucked by the next crafty criminal who can get his hands on it. Now your sensitive personal information is inside not only in your garbage can but as a result of the last couple of decades, information technology now has the ability to send your personal information in packets of data and over telephone wires.... [tags: Computers]
3662 words (10.5 pages)
- Related Work The key management problem is an bigger issue in sensor field. Each and every sensor nodes are needed to transmit the node, then only the data’s are reached to base station, so each and every sensor node within a group need an keys to transmit the data. While attacker entered and also get the full access of sensor node, and ready to hack data, but they need to wait. Because the node are none of the keys at the time, transmitting time only the nodes get access of keys from the cluster head.... [tags: Secutiry, Sensor Nodes, Key Management System]
1217 words (3.5 pages)
- Act 1 Scene 1 Of William Shakespeare 's Romeo And Juliet
- Supply Chain Management : Management Of The Flow Of Goods And Services
- Competitive Priorities Are The Critical Operational Dimensions A Process Or Supply Chain?
- The And If You Wrong Us Shall We Not Revenge?
- Successful Conflict Resolution At Four Square Company
- The Most Important Part Of My Life