Cyber Security Expo
 
Wireless Security Hodgepodge by Glenn Royster on 22/07/05

During the infancy of the wireless computing age, key defenses and deterrents to wireless attacks were the cost and complexity of methods required to partake in such activities. The current age of easily accessible, inexpensive tools have tilted the balance of price, complexity, and deterrence in favor of the novice wireless attacker. During year 2005, over a billion wireless users are projected (Lauter, 2004). As of this writing, the wireless security discussion is in escalation. This paper is a brief participant of the discussion, and concludes multiple security mechanisms (a hodgepodge, instead of a single solution) provide maximum wireless security.

This document is in PDF format. To view it click here.

Rate this article

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.