TITLE

Security Becomes Bigger Issue

AUTHOR(S)
Smith, Brad
PUB. DATE
September 2005
SOURCE
Wireless Week;9/15/2005, Vol. 11 Issue 19, p30
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on the efforts of anti-virus and software companies to offer products and services, which will protect wireless network operators from security attacks. Vulnerability of the wireless network devices to security attacks; Strategies that can be used by network operators to protect their devices; Security products of Symantec that run on most handheld operating systems; Initiative introduced by McAfee aimed at carriers and other service providers for managed security.
ACCESSION #
18271365

 

Related Articles

  • A Novel Technique to Protect Wireless Network against accidental Association. Reddy, Geetha Manchi; Chakravarthula, Keerthi Priya Nallan; Kantu, Abhilash Reddy; Manjunath, G. // International Journal of Computer Applications;Apr2012, Vol. 44, p22 

    With increasing numbers of corporate and organizations deploying wireless network and allowing the company personnel to access the internet or the wired backbone through wireless access points are increasingly getting exposed to hacking attacks. Due to easy hacking tools and less concerns about...

  • Can ACLs and NAC mix for security success? Snyder, Joel // NetworkWorld Asia;Jun2008, Vol. 4 Issue 5, p24 

    The article discusses the possibility of mixing the access control lists (ACL) and network access control (NAC) for security success. According to the article, the NAC envelope was pushed during the Interop with the decision that access control would be handled with a combination of ACLs and...

  • GLS' DEBUTS VULNERABILITY ASSESSMENT SERVICE FOR ENTERPRISES.  // Computer Security Update;Jun2004, p1 

    GLS (Global Linking Solutions), Charlotte, NC, a managed service provider for Wide Area Networks and security solutions, has introduced its Vulnerability Assessment Service, which, as a proactive rather than reactive service, marks a more economic approach to Enterprise security. In addition, in...

  • Security Uses for Wireless Networks. Engebretson, David // SDM: Security Distributing & Marketing;Jan2005, Vol. 35 Issue 1, p66 

    The article reports on several electronic security systems. Many of today's electronic security systems are designed to operate on a communications or computer network. The common wireless network systems in use today fall under the general description of Wi-Fi, which stands for wireless...

  • City firms still failing to guard WLans. Goodwin, Bill // Computer Weekly;6/22/2004, p4 

    Businesses in Europe's leading financial centres are failing to secure their wireless access points despite the risk of "drive-by" hacking. More than 33% of businesses surveyed in London, Milan, Paris and Frankfurt are still making fundamental security mistakes, research by RSA Security Inc....

  • Scalable and efficient key management for heterogeneous sensor networks. Kausar, Firdous; Hussain, Sajid; Yang, Laurence t.; Masood, Ashraf // Journal of Supercomputing;Jul2008, Vol. 45 Issue 1, p44 

    As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications. In this paper, we propose a key management scheme based on random key predistribution for heterogeneous wireless sensor...

  • A Study on Tachograph based Security Network. Sania Yaqoob; Changhoon Lee; Taeshik Shon // International Journal of Smart Home;Jan2013, Vol. 7 Issue 1, p231 

    Tachographs are used in vehicles for keeping track of driver's hours and for other purposes of fraud detection, overspeeding and accident investigation.Their usage and benefits are in danger beacuse of increasing levels of frauds and manipulation.Tachograph fraud and tampering has become very...

  • SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS. Soleman, Hosam; Payandeh, Ali // International Journal of Network Security & Its Applications;May2014, Vol. 6 Issue 3, p85 

    Because of the widespread use of wireless sensor networks in many applications, and due to the nature of the specifications of these networks (WSN) in terms of wireless communication, the network contract specifications, and published it in difficult environments. All this leads to the network...

  • Protecting the Communication Structure in Sensor Networks. Olariu, S.; Xu, Q.; Eltoweissy, M.; Wadaa, A.; Zomaya, A. Y. // International Journal of Distributed Sensor Networks;2005, Vol. 1 Issue 2, p187 

    In the near future wireless sensor networks will be employed in a wide variety of applications establishing ubiquitous networks that will pervade society. The inherent vulnerability of these massively deployed networks to a multitude of threats, including physical tampering with nodes...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics