TITLE

Untitled

AUTHOR(S)
Ashford, Warwick
PUB. DATE
November 2007
SOURCE
Computer Weekly;11/20/2007, p116
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article presents information on the survey related to wireless security, by Air Defense. It states that, by using insecure wireless network connections, retailers are exposing customers to theft of credit card information. The survey showed that 85% of wireless devices used by retailers, risked theft of customer and business data. The survey found that the most common security weaknesses included misconfigured access points, the use of default network names, and missing or weak data encryption.
ACCESSION #
27962767

 

Related Articles

  • Flooding Attack.  // Network Dictionary;2007, p199 

    A definition of the term "flooding attack" is presented. In the network security context, it refers to an attack that attempts to cause a failure in a computer system or other data processing entity. Flooding attack provides more input than the entity can properly process.

  • Updating data protection law. Ilett, Dan // Computer Weekly;8/12/2008, p24 

    The article reports that after a plenty of data breaches, the government in Great Britain is looking to strengthen data protection laws. As reported, the Liberal Democrats dubbed 2007 the worst year ever for data protection and privacy, as almost 37 million Britons saw their records lost into...

  • Mobility Management Enhancement for Transferring AAA Context in Mobile Grid. Hee Suk Seo; Tae Kyung Kim // Proceedings of World Academy of Science: Engineering & Technolog;Dec2007, Vol. 36, p652 

    Adapting wireless devices to communicate within grid networks empowers us by providing range of possibilities.. These devices create a mechanism for consumers and publishers to create modern networks with or without peer device utilization. Emerging mobile networks creates new challenges in the...

  • Challenges and Requirements of Digital Forensics Investigation in Wireless Ad-hoc Networks. Altalhi, Abdulrahman H.; Abdullah, Labeeb Mohsin; Sidek, Zailani Mohamed; Azmi, Muhammad Sufyian Mohd // International Journal of Advanced Research in Computer Science;Jan/Feb2012, Vol. 3 Issue 1, p26 

    Digital forensics involves the acquisition and investigation of materials that are collected from digital devices involved in digital crimes. Currently, the term "digital forensics" is used to cover the investigation of all devices used to store digital data. There are some technologies that...

  • Wireless carriers want more proof. Luna, Lynnette // America's Network;5/1/2004, Vol. 108 Issue 7, p12 

    The deep freeze that has afflicted the majority of players in the telecom industry appears to be thawing for many operational support system (OSS) vendors looking to push their wares into the wireless carrier community. The OSS industry has been one of the hardest hit during the severe telecom...

  • Techtalk: Wireless Networking. Caverly, David C.; MacDonald, Lucy // Journal of Developmental Education;Spring2005, Vol. 28 Issue 3, p38 

    Discusses key issues concerning wireless networking. Adopting and adapting into instructional repertoire; Appropriation of cellular networks; Implications on developmental education.

  • Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks. Mohaisen, Abedelaziz; DaeHun Nyang; AbuHmed, Tamer // KSII Transactions on Internet & Information Systems;2008, Vol. 2 Issue 5, p222 

    In this paper, the random key pre-distribution scheme introduced in ACM CCS'02 by Eschenauer and Gligor is reexamined, and a generalized form of key establishment is introduced. As the communication overhead is one of the most critical constraints of any successful protocol design, we introduce...

  • A Setup for the Evaluation of MUSIC and LMS Algorithms for a Smart Antenna System. Shubair, Raed M.; Al-Qutayri, Mahmoud A.; Samhan, Jassim M. // Journal of Communications;Jun2007, Vol. 2 Issue 4, p71 

    This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beamforming. Direction-of-arrival (DOA) estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the...

  • Next frontier for wireless: Sensor networks. Cox, John // Network World;6/7/2004, Vol. 21 Issue 23, p10 

    Wired sensor networks have been around for decades, with an array of gauges measuring temperature, fluid levels, humidity and other attributes on pipelines, pumps, generators and manufacturing lines. Now advances in silicon radio chips, coupled with cleverly crafted routing algorithms and...

Share

Read the Article

Courtesy of

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics