IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 1 - Issue 11, December 2012 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Managing Wireless Security In An Organization

[Full Text]

 

AUTHOR(S)

Muhammad Jahanzaib Khan

 

KEYWORDS

Keywords:- Wireless Networks, Wireless Security

 

ABSTRACT

Abstract:- The adoption of wireless mobile computing solutions has been of benefit to government institutions, commerce and learning institutions among others. This is because of the higher customer satisfaction and higher productivity that have been made possible. A wireless network is a computer network, which is not connected by cables. This assists business enterprises and organizations by facilitating a flexible environment and avoids the capital cost of installing cabling in a building. The network is implemented by use of radio waves for transmission. This paper will discuss how to handle wireless security in an organization.

 

REFERENCES

[1] Abrams, Marshall D., Jajodia, Sushil G., and Podell Harold J. Information Security: An Integrated Collection of Essays, in IEEE Computer Society Press, Los Alamitos, CA: USA. 1995.

[2] AirDefense, Inc. Wireless LAN Security: Intrusion Detection and Monitoring for the Enterprise. 2002: Pp.9-10.

[3] Borisov, Nikita, Goldberg, Ian and Wagner, David. Security of the WEP Algorithm.

[4] Computer Security Research Centre, National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publications. 2002. 23-25.

[5] Geier, Jim. 802.11 Security Beyond WEP. 28 Oct. 2002. August 30, 2011 http://www.80211planet.com/tutorials/article.php/1377171

[6] Gast, Matthew. 802.11 Wireless Networks: The Definitive Guide, Second Edition. Sebastapol, CA: O’Reilly & Associates, Inc., 2005: pp.50-60.

[7] IBM Corporation. Wireless Security Auditor (WSA) 30 Oct. 2002. August 30, 2011 http://researchweb.watson.ibm.com/gsal/wsa/Isomair.com.

[8] Goldsmith, Andrea. Wireless Communications. Cambridge University Press. 2005. Pp.12-15.

[9] Knowledge Systems (UK) Ltd. Wireless LAN Security Issues. (28 Oct. 2002). August 30, 2011 http://www.ksys.info/wlan_security_issues.html

[10] Isomair Security for Wireless World. (30 Oct. 2002). August 30, 2011 http://www.isomair.com/products.html

[11] Molisch, Andreas. Wireless Communications. Wiley-IEEE Press. 2005: Pp2-4.

[12] Negrino, Tom and Smith, Dori. Mac OS X Unwired. Sebastopol, CA: O’Reilly & Associates, Inc., 2003. pp.24-26.

[13] Rappaport, Theodore. Wireless Communications: Principles and Practice. Prentice Hall. 2002. Pp.5-7.


[14] Rhoton, John. The Wireless Internet Explained. Digital Press. 2001. Pp.33-37.

[15] Tse, David; Viswanath, Pramod. Fundamentals of Wireless Communication. Cambridge press, 2005. pp.65-69.

[16] Potter, Bruce and Fleck, Bob. 802.11 Security. Sebastopol, CA: O’Reilly & Associates, Inc.2002. Pp.5-9. Ross, John.

[17] The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless, Second Edition. San Francisco, CA: No Starch Press. 2008. Pp.28-32.

[18] Trček, Denis. An integral framework for information systems security management.

[19] Computers & Security. Vol.22. New York: Macmillan, 2003. pp.337-360.

[20] Weeks, Roger et al. Linux Unwired. Sebastopol, CA: O’Reilly & Associates, Inc., 2002. pp.18-20.

[21] Whitson, G. Computer security: theory, process and management, J. Comput. Small Coll, 18. (2003): 57-66.