Managing Wireless Security In An Organization
Muhammad Jahanzaib Khan
Keywords:- Wireless Networks, Wireless Security
Abstract:- The adoption of wireless mobile computing solutions has been of benefit to government institutions, commerce and learning institutions among others. This is because of the higher customer satisfaction and higher productivity that have been made possible. A wireless network is a computer network, which is not connected by cables. This assists business enterprises and organizations by facilitating a flexible environment and avoids the capital cost of installing cabling in a building. The network is implemented by use of radio waves for transmission. This paper will discuss how to handle wireless security in an organization.
 Abrams, Marshall D., Jajodia, Sushil G., and Podell Harold J. Information Security: An Integrated Collection of Essays, in IEEE Computer Society Press, Los Alamitos, CA: USA. 1995.
 AirDefense, Inc. Wireless LAN Security: Intrusion Detection and Monitoring for the Enterprise. 2002: Pp.9-10.
 Borisov, Nikita, Goldberg, Ian and Wagner, David. Security of the WEP Algorithm.
 Computer Security Research Centre, National Institute of Standards and Technology. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publications. 2002. 23-25.
 Geier, Jim. 802.11 Security Beyond WEP. 28 Oct. 2002. August 30, 2011 http://www.80211planet.com/tutorials/article.php/1377171
 Gast, Matthew. 802.11 Wireless Networks: The Definitive Guide, Second Edition. Sebastapol, CA: O’Reilly & Associates, Inc., 2005: pp.50-60.
 IBM Corporation. Wireless Security Auditor (WSA) 30 Oct. 2002. August 30, 2011 http://researchweb.watson.ibm.com/gsal/wsa/Isomair.com.
 Goldsmith, Andrea. Wireless Communications. Cambridge University Press. 2005. Pp.12-15.
 Knowledge Systems (UK) Ltd. Wireless LAN Security Issues. (28 Oct. 2002). August 30, 2011 http://www.ksys.info/wlan_security_issues.html
 Isomair Security for Wireless World. (30 Oct. 2002). August 30, 2011 http://www.isomair.com/products.html
 Molisch, Andreas. Wireless Communications. Wiley-IEEE Press. 2005: Pp2-4.
 Negrino, Tom and Smith, Dori. Mac OS X Unwired. Sebastopol, CA: O’Reilly & Associates, Inc., 2003. pp.24-26.
 Rappaport, Theodore. Wireless Communications: Principles and Practice. Prentice Hall. 2002. Pp.5-7.
 Rhoton, John. The Wireless Internet Explained. Digital Press. 2001. Pp.33-37.
 Tse, David; Viswanath, Pramod. Fundamentals of Wireless Communication. Cambridge press, 2005. pp.65-69.
 Potter, Bruce and Fleck, Bob. 802.11 Security. Sebastopol, CA: O’Reilly & Associates, Inc.2002. Pp.5-9. Ross, John.
 The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless, Second Edition. San Francisco, CA: No Starch Press. 2008. Pp.28-32.
 Trček, Denis. An integral framework for information systems security management.
 Computers & Security. Vol.22. New York: Macmillan, 2003. pp.337-360.
 Weeks, Roger et al. Linux Unwired. Sebastopol, CA: O’Reilly & Associates, Inc., 2002. pp.18-20.
 Whitson, G. Computer security: theory, process and management, J. Comput. Small Coll, 18. (2003): 57-66.