preview

Nt1210 Research Paper

Decent Essays

My Paper Addressing the following:
• Outline a wireless network and technology that you use regularly. The WLANs which are derived from the IEEE 802.11 standards, and marketed under the Wi-Fi trademark name. The WLANs security is neither forthright/candid nor simple, and it is continuously varying. Even though, as WLAN increase client output, they also expose the networks to a new group of potential hackers. With the present inherent security weakness of the 802.11 standard, all companies, small, medium or large, need to find out their security conditions derived from the applications using the WLAN. The standards also provide requirements for high-speed networks that support most modern-day applications. What sorts of security issues do …show more content…

A mobile network operator or MNO, which is also referred to as a wireless service provider, wireless carrier, cellular company, or mobile network carrier, which is a provider of wireless service communications that owns manages/controls all the elements essential to sell and deliver service to an end user, in addition to radio spectrum distribution, wireless network basic underlying framework, back haul basic underlying framework, billing, customer service, supplying computer systems, marketing, and repair companies. Additionally, it can acquire revenue by just offering retail services under a brand it owns, and the MNO may also sell means of entry to network services at wholesale prices to mobile virtual network administrators. What sorts of security issues do you face, and how do you address them? For one a smartphone for example, which is exposed to a number of threats when they tend to use their phones, like threats that can disrupt the working of the smartphone or send/transmit or modify the user data. In addition , since some applications could themselves be actually malware, their range of capabilities and activities should be restricted (for instance, limiting the apps from getting into location information via GPS, blocking entry to the user’s address book, stopping the transmittal of data on the network, sending SMS messages that are actually billed to the user, etc.). There happens to be three potential targets for attackers and they are: 1. Data, 2. Identity, and 3. Availability by attacking a smartphone and limiting access to it or depriving the owner of the

Get Access