Access Millions of academic & study documents

Wireless Network Security

Content type
User Generated
Subject
Computer Science
Type
Homework
Showing Page:
1/3
Running Head: WIRELESS NETWORKS 1
Wireless Networks
Institution Affiliation
Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
WIRELESS NETWORKS 2
Generally, the wireless networks are on the rise in the recent years as the technology
gives new ways of networking. Despite the developments, there are major issues related to the
security as it relates to the wireless networks. The main concerns are on the matters of
confidentiality as well as integrity and the availability to the users. The wireless networks have
been the main target of the cyber-attacks due to the vulnerabilities and the risks associated with
the networks (Cardwell, 2013). However, with the development of the new generation of
configuration and encryption, it will be possible to govern the wireless networks in an efficient
and effective manner.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Running Head: WIRELESS NETWORKS 1 Wireless Networks Institution Affiliation Date: WIRELESS NETWORKS Generally, the wireless networks are on the rise in the recent years as the technology gives new ways of networking. Despite the developments, there are major issues related to the security as it relates to the wireless networks. The main concerns are on the matters of confidentiality as well as integrity and the availability to the users. The wireless networks have been the main target of the cyber-attacks due to the vulnerabilities and the risks associated with the networks (Cardwell, 2013). However, with the development of the new generation of configuration and encryption, it will be possible to govern the wireless networks in an efficient and effective manner. 2 WIRELESS NETWORKS 3 References Cardwell, K. (2013). BackTrack: Testing Wireless Network Security. Birmingham: Packt ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4