TITLE

Don't Pretend, Defend

AUTHOR(S)
Williamson, John
PUB. DATE
July 2000
SOURCE
Global Telephony;Jul2000, Vol. 8 Issue 7, p18
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the need for wireless operators to be on guard against fraud and security breaches. Projected growth of telecommunication and information technology fraud and security concerns; Operators and end users' need to be familiar with how their network or service could be hit by fraud; Susceptibilities of wireless networks to fraud. INSETS: Behavioral Science;Getting Smart.
ACCESSION #
3402662

 

Related Articles

  • i3Mobile introduces security feature.  // RCR Wireless News;9/25/2000, Vol. 19 Issue 39, p16 

    Features the wireless portal developed by i3Mobile Inc. for security service providers to detect threats to information systems and networks in Stamford, Connecticut.

  • Proprietary fixes for WAP security gap. Chan, Tony // Telecom Asia;Feb2000, Vol. 11 Issue 2, p20 

    Cites the technical issues concerning the wireless application protocol (WAP) technology. Incorporation of Wireless Transport Layer Security; Need for another form of encryption at the section of the network between the gateway and server; WAP security solutions.

  • .8% down, 3% to go. Boney, Karissa // Cellular Business;Dec97, Vol. 14 Issue 13, p6 

    Opinion. Presents the author's view on the decreasing claim of wireless fraud as seen in the percentage of the telecommunications industry's overall revenue stream in United States for the year 1996. Obstacles put up by carriers and vendors for cloners; Advice of the author to carriers in...

  • Bluetooth Bulletin. Beach, Tarre // Wireless Review;07/15/2000, Vol. 17 Issue 14, p46 

    Focuses on the Bluetooth technology, a short-range radio link for the wireless industry. How Bluetooth-enabled devices can minimize interference; Levels of security of Bluetooth's operation modes; Other forms of security Bluetooth uses; Qualification program developed to ensure its...

  • Securing wireless transactions. Chen, Anne // eWeek;04/02/2001, Vol. 18 Issue 13, p44 

    Predicts the extension of the security and identity verification capabilities of public-key infrastructure in wired transactions in the United States to wireless transactions. Modification of public-key infrastructure products for mobile applications; Enabling of wireless users to encrypt their...

  • Criminals sniff out cracks in wireless data. Laughlin, Kirk // America's Network;4/15/2002, Vol. 106 Issue 6, p18 

    Discusses the subscription fraud in wireless communication system. Cost of stealing network access; Approaches used by companies to detect and prevent fraud; Risks in the wireless data product.

  • Don't forget fraud. Carroll, Kelly // Telephony;10/11/99, Vol. 237 Issue 15, p42 

    Probes into the wireless industry's battle with fraud. Consequences of the fraud practices; Comments from industry officials; Other methods of fraud that will result in losses for the wireless industry. INSETS: Briefly;The many faces of fraud.

  • Navigating new fraud minefields. Young, Todd // Wireless Review;03/15/98, Vol. 15 Issue 6, p84 

    Focuses on subscription fraud associated with wireless communication systems. Increase in subscription-fraud levels; Cloning losses; Fraud issues associated with digital technology.

  • Is wireless fraud on the decline? Beckman, Kristen // RCR;09/20/99, Vol. 18 Issue 38, p30 

    Looks at whether there has been an actual decline in the incidence of fraud in the wireless communication industry in the United States in the second half of the 1990s. Decrease in monetary losses from wireless fraud; Likelihood that subscription fraud will exceed cloning fraud in 1999; Factors...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics