Wireless Security

Wireless Security

M. Belsis, A. Simitsis, S. Gritzalis
Copyright: © 2007 |Pages: 6
ISBN13: 9781599040028|ISBN10: 1599040026|EISBN13: 9781599040035
DOI: 10.4018/978-1-59904-002-8.ch172
Cite Chapter Cite Chapter

MLA

Belsis, M., et al. "Wireless Security." Encyclopedia of Mobile Computing and Commerce, edited by David Taniar, IGI Global, 2007, pp. 1028-1033. https://doi.org/10.4018/978-1-59904-002-8.ch172

APA

Belsis, M., Simitsis, A., & Gritzalis, S. (2007). Wireless Security. In D. Taniar (Ed.), Encyclopedia of Mobile Computing and Commerce (pp. 1028-1033). IGI Global. https://doi.org/10.4018/978-1-59904-002-8.ch172

Chicago

Belsis, M., A. Simitsis, and S. Gritzalis. "Wireless Security." In Encyclopedia of Mobile Computing and Commerce, edited by David Taniar, 1028-1033. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59904-002-8.ch172

Export Reference

Mendeley
Favorite

Abstract

The fast growth of wireless technology has exponentially increased the abilities and possibilities of computing equipment. Corporate users can now move around enterprise buildings with their laptops, PDAs, and WiFi; enable VoIP handsets; and retain communications with their offices. Business users can work from almost anywhere by attaching their laptops to WiFi hotspots and connecting to their corporate network. However, not many enterprises know and understand the potential security vulnerabilities that are introduced by the use of WiFi technologies. Wireless technologies are insecure by their nature. Anyone with the appropriate hardware can steal information transmitted using the airwaves. This article discusses the security vulnerabilities that are inherited in wireless networks. Also, it provides a description of the current security trends and protocols used to secure such WiFi networks along with the problems from their application.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.