Wednesday, June 12, 2019

Comparing And Contrasting Wireless Security Essay

Comparing And Contrasting Wireless Security - Essay ExampleYet, as recent events have shown, this wall is at best overstated and at worst illusory altogether. Regardless, radio set tribute is no longer a rival for only the home and business. As wireless access points grow in popularity, there is a growing need to secure networks that are designed to be used by members of the public. As Chenoweth, Minch and Tabor (2010) point out, these networks offer little or no security for the terminal user, which is a completely different problem, but related in the potential consequences of misuse. Finally, Potter (2006) believes that achieving true security at one of these public networks is impossible and that Laptops and PDAs are so vulnerable in wireless hotspots, users would do well to turn them off (p. 51). The suck ups of wireless security that those authors give are separable into two different sets of categories. First, the authors either give an optimist/descriptive view or a pe ssimist/prescriptive view of how end users should interact with wireless technology given security concerns. Loo (2008) witnessed the breach in internet security at a U.S. credit card processing center (a descriptive view) and wrote about how users can protect themselves. On the other hand, Chenoweth, Minch and Tabor (2010) and Potter (2006) exposit how there is virtually no security on wireless networks (a pessimistic view) and that users might be better off not using them (a normative view). Second, the authors give either an account of surreptitious home or business wireless security or an account of public hotspot wireless security. Once again, while Loo (2008) is writing primarily about private end users operating their own private networks, Chenoweth, Minch and Tabor (2010) and Potter (2006) are discussing networks in the context of public hotspots, as opposed to private channels. Seeing the literature in this way, one might realize that there is a certain harmony at work f rom the time between 2006 and 2010, little advancements have been made in improving the wireless security for public networks. Meanwhile, private networks remain potentially unprotected, but that the weakest link in that chain is the end user, not the network itself as seems to be the case with public wireless hotspots. From this perspective, one can take down to put into context the kind of advice or observations that each article makes. Loo (2008) opens his discussion of private network wireless security by overviewing why end users are the weakest components in a computer systems security. He writes, In most systems, the weakest components are the end users, particularly when they are accessing the corporations databases with wireless facilities at home (p. 68). Of course, what he is suggesting here is that corporations must safeguard their information from private individuals because, although those private individuals may think their connection is secure, it may be the easiest access way that an outsider has to gain access to the sensitive information contained within a corporations network. Loo (2008) dispels some of the myths above this private security, including the common belief that home computers are not attractive to hackers. However, this belief is false considering the increasingly digitized way that individuals share knowledge and communicate. Not only

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.