Wireless Computing Technology, E.G., Remote Access To Term Paper

PAGES
2
WORDS
849
Cite

¶ … wireless computing technology, e.g., remote access to the company or corporate network creates many benefits for an enterprise, such as increased mobility and flexibility, but anonymity almost always also makes a network vulnerable. An intruder might attack from thousands of miles away and never come into direct contact with the system, its administrators or users (Pfleeger and Pfleeger, 2007, p. 397). Therefore authentication, e.g., a process of determining that a system user is the person who he declares to be is required. It must be handled carefully and correctly in a network because a network involves authentication not just of people but of businesses, servers, and services only loosely associated with a person (Pfleeger & Pfleeger, 2007, p. 398).

Authentication is most commonly done by the use of log-on passwords. Knowledge of the password is assumed to guarantee that the user is the person he purports to be. Nevertheless, passwords are considered the least secure authentication factor because they do not require sophisticated attacks. Their biggest flaw is that the security level depends directly on the complexity of a password. The result is that too many overly complex passwords tend to induce people to make use of various methods to remember passwords, such as writing them down or simply using passwords that are easy to remember, such as their...

...

If remote access is only secured with a weak static password, it becomes easy for intruders to intercept. In many instances, impersonation is an easier way than wiretapping or eavesdropping for obtaining information. In an impersonation, an attack has the choice between several measures. He can guess the identity and authentication details of the target or pick up the identity and authentication details of the target from a previous communication or from wiretapping. He may circumvent or disable the authentication mechanism at the target computer or use a target that will not be authenticated. Finally, he may decide to use a target whose authentication data are known (Pfleeger & Pfleeger, 2007, p. 415 ff.).
Compromised passwords can have disastrous results including the loss of sensitive employee and customer profiles, social security data and credit information. Imposing a strict password policy is rarely helpful, because it entails the disadvantage that complex passwords and regular password changes tend to be confusing for many employees (see Hunt, 2010, p. 2).

Regulatory guidance and best practices therefore recommend multiple factors or layered authentication, e.g., "strong authentication," also referred to as "two factor authentication," because adoption of a layered approach is regarded to be the strongest…

Sources Used in Documents:

References

5 Essential Steps for Implementing Strong Authentication in the Enterprise. (2011) (pp. 1 -- 22). Derived 16 August 2011 from www.verisign.com/authentication/.../authentication.../whitepaper-strong.

National Committee on Security Systems (CNSS) Instruction No. 4009 of 26 April 2010. Derived 16 August 2011 from www.cnss.gov/Assets/pdf/cnssi_4009.pdf.

Hunt, T.K. (2010). Strong authentication eliminates risks intrinsic to the use of wireless technology. (pp. 1-3). Derived 16 August 2011 from www.connect-world.com/.../11047-strong-authentication-eliminates.

Pfleeger, C.P. & Pfleeger, S. (2007). Security in Computing (4th ed.). (pp. 376-507). Saddle River, New Jersey: Prentice Hall.


Cite this Document:

"Wireless Computing Technology E G Remote Access To" (2011, August 16) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/wireless-computing-technology-eg-remote-44012

"Wireless Computing Technology E G Remote Access To" 16 August 2011. Web.24 April. 2024. <
https://www.paperdue.com/essay/wireless-computing-technology-eg-remote-44012>

"Wireless Computing Technology E G Remote Access To", 16 August 2011, Accessed.24 April. 2024,
https://www.paperdue.com/essay/wireless-computing-technology-eg-remote-44012

Related Documents

wireless network technology. Mainly, I will discuss the main features of wireless technology, and explain how network technology has become so useful in the present time. In the next section, I will give a brief review of ten articles and show how they are related to the above theme of the essay. Finally, I will explain the impact of wireless technology within the next decade. In the present section, a brief

3G mobile technologies on teenagers Mobile communication technology (e.g., wi-fi, the 3G cell phone, Music player) uses in American youth are omnipresent (Aoki and Downes, 2003; Chen, 2006; Katz, 2008). Among numerous modern mobile interactive technologies, the 3G cell phone is understood to be "the most radiative domestic appliance ever invented" (Coghill, 2001, p. 28). Various reasons, for example comfort, convenience, mobility, security, as well as networking put together why

It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21). Although the decision to transition from a traditional approach to cloud computing will depend on each organization's unique circumstances, a number of general benefits have been cited for those companies that have made the partial or complete transition to

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

" (Doukas, Maglogiannis and Kormentzas, 2006) The following illustration shows the evaluation Platform Architecture. Figure 3 The Evaluation Platform Architecture Doukas, Maglogiannis and Kormentzas (2006) state that the patient state vital signs are monitored through a PDA device attached to the patient and transmitted to a computer for evaluation through wireless access or Bluetooth. Additionally the patient site is monitored through use of a camera. The software that has been developed is used

solution for a client of Wireless Technology Company. They are a company that assists organizations and businesses when it comes to issues that involve networking, bandwidth, productivity and connectivity. The client in need of a solution right now is The Athlete's Shack. They are a chain of sporting goods stores with about ten stores in the area. While the company has a technology framework in place, they are lacking