TITLE

On the hot spot

AUTHOR(S)
Anderberg, Ken
PUB. DATE
July 2004
SOURCE
Communications News;Jul2004, Vol. 41 Issue 7, p4
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
This article comments on the subject of wireless hot spots. Research firm Gartner estimates that hot spot users worldwide will reach 30 million in 2004 and by the end of 2004, more than 50% of professional notebooks will be Wi-Fi capable. In other words, employees will increasingly be using hot spots when they are traveling, potentially compromising the security of local area networks (LAN), as well as incurring significant access charges from wireless providers. A strategy is needed to address such problem and to control security and costs. Costs can build quickly, as an employee, for example, on a week-long sales trip, logs on in airport, hotel and coffee shop hot spots, incurring an access fee each time. The productivity gains of such remote access are obvious, but without controlling costs, those gains can disappear rapidly. Then there is the question of security. The employee wirelessly accesses the corporate LAN at an airport, where hackers can intercept data transmission. It is necessary to establish procedures for employees and use wireless service providers that can accommodate the usage patterns of traveling workers. Importantly, it is important to set up requirements for employees when logging on to the organization's network to ensure installed security features are used and used properly.
ACCESSION #
13757687

 

Related Articles

  • Poll: Security tops LAN switch purchase considerations in '06. Hochmuth, Phil // Network World;10/3/2005, Vol. 22 Issue 39, p12 

    This article focuses on the result of a survey that indicates that security, standards compliance and price/performance are key aspects for IT professionals when choosing a local area network (LAN) switch vendor. The study found that users expect to increase their spending on switches by 35...

  • Backbone.  // Network Dictionary;2007, p56 

    A definition for "backbone" is presented. It refers to the part of a network that acts as the primary path for all network traffic, which requires very high bandwidth. A backbone network of a service provider connects many enterprise subnetworks and networks of smaller service providers, while...

  • Speech Encryption and Decryption Using Linear Feedback Shift Register (LFSR). Tin Lai Win; Kyaw, Nant Christina // Proceedings of World Academy of Science: Engineering & Technolog;Dec2008, Vol. 48, p1293 

    This paper is taken into consideration the problem of cryptanalysis of stream ciphers. There is some attempts need to improve the existing attacks on stream cipher and to make an attempt to distinguish the portions of cipher text obtained by the encryption of plain text in which some parts of...

  • Another study finds WLAN vulnerabilities. Albright, Brian // Frontline Solutions;Jun2001, Vol. 2 Issue 6 

    Identifies the dangers of security breach facing wireless local area networks (WLAN). Companies susceptible to WLAN security breaches; Flaws in the Wired Equivalency Privacy feature affecting WLAN security.

  • EFFECTIVE VOICE CALLS ADMISSION FOR AUTHORIZED USER IN INTER VOIP NETWORK. Subashri, T.; Vaidehi, V. // International Journal of Network Security & Its Applications;Oct2010, Vol. 2 Issue 4, p213 

    IP based voice transmission technology is a flexible, simpler and a cost effective implementation of voice transmission. It provides a real convergence of various networks. This voice transmission technology does not support a quality that is equivalent to digitized voice, which is available in...

  • Mobile devices impact WLANs. Gilby, Christian // Communications News;Jan2008, Vol. 45 Issue 1, p28 

    The article discusses the considerations in the selection of wireless local area networks (WLANs). The system should provide security mechanisms which allow access to the network and blocks inappropriate devices. WLANs must not degrade the quality-of-service of mobile devices such as adapter...

  • INTEGRALIS OFFERS TWO LEVELS OF NETWORK PROTECTION.  // Networks Update;Nov2005, p1 

    The article reports on the launch of Secure Watch, a co-managed security service for SOHO/ROBO and enterprise level customers, by Integralis. The product allows companies to protect their corporate networks by working directly with Integralis Security professionals and the company's...

  • Test parameters for VoWLAN. Buerger, Chris // Communications News;Aug2004, Vol. 41 Issue 8, p30 

    This article deals with test parameters for voice-over wireless local area networks (VoWLAN). It was learned that care needs to be taken when overlaying voice-over Internet protocol (VoIP) on an existing 802.11 network to fully understand and measure the impact voice deployment will have on the...

  • Mobilising the office -- again.  // Management Services;May94, Vol. 38 Issue 5, p26 

    Most people are aware of the fact that before personal computers (PC) came into the scene, desks in all offices were busy places, even in the information processing factories of insurance companies, people exchanged documents, asked each other questions, walked to central filing units or to...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics