Loading…
WIRELESS SECURITY SYSTEM
Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless...
Saved in:
Published in: | International journal of computer science and information security 2012-04, Vol.10 (4), p.140-140 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 140 |
container_issue | 4 |
container_start_page | 140 |
container_title | International journal of computer science and information security |
container_volume | 10 |
creator | Kirankumar, B Babu, V Madhu Prasad, D Siva Vishnumurthy, R |
description | Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT] |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1365113683</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1365113683</sourcerecordid><originalsourceid>FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13</originalsourceid><addsrcrecordid>eNpdjjFrwzAUhEWh0JBmzxjo0sXw5PeeJY3BqK3BIRA5hExGxDI0OHEa1f-_gnbqDXc3fBz3IGbSkMqYAZ7EIsYzJKEkljwTy0O1s7V1buVsud9VzXHljq6xm2fx2PshhsVfzkXzZpvyI6u371W5rrNbITELXe89Ga0L3SOCCeSZWJ8YGPKuL7xhnZNS3BEY5U2eB2IMoFJn30mci9ff2dt9_JpC_G4vn_EUhsFfwzjFVmLBMpnGhL78Q8_jdL-mc60E1JT-aMYf6g5AMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1038461385</pqid></control><display><type>article</type><title>WIRELESS SECURITY SYSTEM</title><source>Free E-Journal (出版社公開部分のみ)</source><creator>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</creator><creatorcontrib>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</creatorcontrib><description>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Broadcasting ; Computer industry ; Computer information security ; Computers ; Confidentiality ; Dangerous ; Management ; Mathematical models ; Networks ; Peer to peer computing ; Productivity ; Risk ; Software ; Virtual private networks ; Wireless communication ; Wireless networks</subject><ispartof>International journal of computer science and information security, 2012-04, Vol.10 (4), p.140-140</ispartof><rights>Copyright L J S Publishing Apr 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Kirankumar, B</creatorcontrib><creatorcontrib>Babu, V Madhu</creatorcontrib><creatorcontrib>Prasad, D Siva</creatorcontrib><creatorcontrib>Vishnumurthy, R</creatorcontrib><title>WIRELESS SECURITY SYSTEM</title><title>International journal of computer science and information security</title><description>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</description><subject>Broadcasting</subject><subject>Computer industry</subject><subject>Computer information security</subject><subject>Computers</subject><subject>Confidentiality</subject><subject>Dangerous</subject><subject>Management</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Peer to peer computing</subject><subject>Productivity</subject><subject>Risk</subject><subject>Software</subject><subject>Virtual private networks</subject><subject>Wireless communication</subject><subject>Wireless networks</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNpdjjFrwzAUhEWh0JBmzxjo0sXw5PeeJY3BqK3BIRA5hExGxDI0OHEa1f-_gnbqDXc3fBz3IGbSkMqYAZ7EIsYzJKEkljwTy0O1s7V1buVsud9VzXHljq6xm2fx2PshhsVfzkXzZpvyI6u371W5rrNbITELXe89Ga0L3SOCCeSZWJ8YGPKuL7xhnZNS3BEY5U2eB2IMoFJn30mci9ff2dt9_JpC_G4vn_EUhsFfwzjFVmLBMpnGhL78Q8_jdL-mc60E1JT-aMYf6g5AMQ</recordid><startdate>20120401</startdate><enddate>20120401</enddate><creator>Kirankumar, B</creator><creator>Babu, V Madhu</creator><creator>Prasad, D Siva</creator><creator>Vishnumurthy, R</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120401</creationdate><title>WIRELESS SECURITY SYSTEM</title><author>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Broadcasting</topic><topic>Computer industry</topic><topic>Computer information security</topic><topic>Computers</topic><topic>Confidentiality</topic><topic>Dangerous</topic><topic>Management</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Peer to peer computing</topic><topic>Productivity</topic><topic>Risk</topic><topic>Software</topic><topic>Virtual private networks</topic><topic>Wireless communication</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Kirankumar, B</creatorcontrib><creatorcontrib>Babu, V Madhu</creatorcontrib><creatorcontrib>Prasad, D Siva</creatorcontrib><creatorcontrib>Vishnumurthy, R</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirankumar, B</au><au>Babu, V Madhu</au><au>Prasad, D Siva</au><au>Vishnumurthy, R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>WIRELESS SECURITY SYSTEM</atitle><jtitle>International journal of computer science and information security</jtitle><date>2012-04-01</date><risdate>2012</risdate><volume>10</volume><issue>4</issue><spage>140</spage><epage>140</epage><pages>140-140</pages><eissn>1947-5500</eissn><abstract>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | EISSN: 1947-5500 |
ispartof | International journal of computer science and information security, 2012-04, Vol.10 (4), p.140-140 |
issn | 1947-5500 |
language | eng |
recordid | cdi_proquest_miscellaneous_1365113683 |
source | Free E-Journal (出版社公開部分のみ) |
subjects | Broadcasting Computer industry Computer information security Computers Confidentiality Dangerous Management Mathematical models Networks Peer to peer computing Productivity Risk Software Virtual private networks Wireless communication Wireless networks |
title | WIRELESS SECURITY SYSTEM |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T03%3A59%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=WIRELESS%20SECURITY%20SYSTEM&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Kirankumar,%20B&rft.date=2012-04-01&rft.volume=10&rft.issue=4&rft.spage=140&rft.epage=140&rft.pages=140-140&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1365113683%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1038461385&rft_id=info:pmid/&rfr_iscdi=true |