Loading…

WIRELESS SECURITY SYSTEM

Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless...

Full description

Saved in:
Bibliographic Details
Published in:International journal of computer science and information security 2012-04, Vol.10 (4), p.140-140
Main Authors: Kirankumar, B, Babu, V Madhu, Prasad, D Siva, Vishnumurthy, R
Format: Article
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 140
container_issue 4
container_start_page 140
container_title International journal of computer science and information security
container_volume 10
creator Kirankumar, B
Babu, V Madhu
Prasad, D Siva
Vishnumurthy, R
description Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]
format article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1365113683</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1365113683</sourcerecordid><originalsourceid>FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13</originalsourceid><addsrcrecordid>eNpdjjFrwzAUhEWh0JBmzxjo0sXw5PeeJY3BqK3BIRA5hExGxDI0OHEa1f-_gnbqDXc3fBz3IGbSkMqYAZ7EIsYzJKEkljwTy0O1s7V1buVsud9VzXHljq6xm2fx2PshhsVfzkXzZpvyI6u371W5rrNbITELXe89Ga0L3SOCCeSZWJ8YGPKuL7xhnZNS3BEY5U2eB2IMoFJn30mci9ff2dt9_JpC_G4vn_EUhsFfwzjFVmLBMpnGhL78Q8_jdL-mc60E1JT-aMYf6g5AMQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1038461385</pqid></control><display><type>article</type><title>WIRELESS SECURITY SYSTEM</title><source>Free E-Journal (出版社公開部分のみ)</source><creator>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</creator><creatorcontrib>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</creatorcontrib><description>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</description><identifier>EISSN: 1947-5500</identifier><language>eng</language><publisher>Pittsburgh: L J S Publishing</publisher><subject>Broadcasting ; Computer industry ; Computer information security ; Computers ; Confidentiality ; Dangerous ; Management ; Mathematical models ; Networks ; Peer to peer computing ; Productivity ; Risk ; Software ; Virtual private networks ; Wireless communication ; Wireless networks</subject><ispartof>International journal of computer science and information security, 2012-04, Vol.10 (4), p.140-140</ispartof><rights>Copyright L J S Publishing Apr 2012</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Kirankumar, B</creatorcontrib><creatorcontrib>Babu, V Madhu</creatorcontrib><creatorcontrib>Prasad, D Siva</creatorcontrib><creatorcontrib>Vishnumurthy, R</creatorcontrib><title>WIRELESS SECURITY SYSTEM</title><title>International journal of computer science and information security</title><description>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</description><subject>Broadcasting</subject><subject>Computer industry</subject><subject>Computer information security</subject><subject>Computers</subject><subject>Confidentiality</subject><subject>Dangerous</subject><subject>Management</subject><subject>Mathematical models</subject><subject>Networks</subject><subject>Peer to peer computing</subject><subject>Productivity</subject><subject>Risk</subject><subject>Software</subject><subject>Virtual private networks</subject><subject>Wireless communication</subject><subject>Wireless networks</subject><issn>1947-5500</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNpdjjFrwzAUhEWh0JBmzxjo0sXw5PeeJY3BqK3BIRA5hExGxDI0OHEa1f-_gnbqDXc3fBz3IGbSkMqYAZ7EIsYzJKEkljwTy0O1s7V1buVsud9VzXHljq6xm2fx2PshhsVfzkXzZpvyI6u371W5rrNbITELXe89Ga0L3SOCCeSZWJ8YGPKuL7xhnZNS3BEY5U2eB2IMoFJn30mci9ff2dt9_JpC_G4vn_EUhsFfwzjFVmLBMpnGhL78Q8_jdL-mc60E1JT-aMYf6g5AMQ</recordid><startdate>20120401</startdate><enddate>20120401</enddate><creator>Kirankumar, B</creator><creator>Babu, V Madhu</creator><creator>Prasad, D Siva</creator><creator>Vishnumurthy, R</creator><general>L J S Publishing</general><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120401</creationdate><title>WIRELESS SECURITY SYSTEM</title><author>Kirankumar, B ; Babu, V Madhu ; Prasad, D Siva ; Vishnumurthy, R</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Broadcasting</topic><topic>Computer industry</topic><topic>Computer information security</topic><topic>Computers</topic><topic>Confidentiality</topic><topic>Dangerous</topic><topic>Management</topic><topic>Mathematical models</topic><topic>Networks</topic><topic>Peer to peer computing</topic><topic>Productivity</topic><topic>Risk</topic><topic>Software</topic><topic>Virtual private networks</topic><topic>Wireless communication</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Kirankumar, B</creatorcontrib><creatorcontrib>Babu, V Madhu</creatorcontrib><creatorcontrib>Prasad, D Siva</creatorcontrib><creatorcontrib>Vishnumurthy, R</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer science and information security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kirankumar, B</au><au>Babu, V Madhu</au><au>Prasad, D Siva</au><au>Vishnumurthy, R</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>WIRELESS SECURITY SYSTEM</atitle><jtitle>International journal of computer science and information security</jtitle><date>2012-04-01</date><risdate>2012</risdate><volume>10</volume><issue>4</issue><spage>140</spage><epage>140</epage><pages>140-140</pages><eissn>1947-5500</eissn><abstract>Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization's overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Wireless networks, in general, are more vulnerable to security attacks than wired networks, due to the broadcast nature of the transmission medium. Furthermore, wireless sensor networks have an additional vulnerability because nodes are often placed in a hostile or dangerous environment where they are not physically protected. In a wireless network, based on threats and security, we come across the security mechanisms and the different types of security level for overcoming the problem of attacks. [PUBLICATION ABSTRACT]</abstract><cop>Pittsburgh</cop><pub>L J S Publishing</pub><tpages>1</tpages></addata></record>
fulltext fulltext
identifier EISSN: 1947-5500
ispartof International journal of computer science and information security, 2012-04, Vol.10 (4), p.140-140
issn 1947-5500
language eng
recordid cdi_proquest_miscellaneous_1365113683
source Free E-Journal (出版社公開部分のみ)
subjects Broadcasting
Computer industry
Computer information security
Computers
Confidentiality
Dangerous
Management
Mathematical models
Networks
Peer to peer computing
Productivity
Risk
Software
Virtual private networks
Wireless communication
Wireless networks
title WIRELESS SECURITY SYSTEM
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-13T03%3A59%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=WIRELESS%20SECURITY%20SYSTEM&rft.jtitle=International%20journal%20of%20computer%20science%20and%20information%20security&rft.au=Kirankumar,%20B&rft.date=2012-04-01&rft.volume=10&rft.issue=4&rft.spage=140&rft.epage=140&rft.pages=140-140&rft.eissn=1947-5500&rft_id=info:doi/&rft_dat=%3Cproquest%3E1365113683%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p613-edfaa498868f3309e4a5458c50502df6a95824775d4097a922e453e077a95ad13%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1038461385&rft_id=info:pmid/&rfr_iscdi=true