Wednesday, October 16, 2019

Wireless Technology used in Business Application Essay

Wireless Technology used in Business Application - Essay Example Nevertheless, even usual e-mail applications corresponds as a security threat for a potential enterprise if hackers gain the access to the network, or feed the network with viruses or other malicious software. IT managers must carefully appraise security risks involved with wireless applications and try to maintain proper security for the networks as is needed. This paper will address the issues regarding wireless technology and tries to discuss the positive and negative points of using this technology for business purposes. Cellular systems were begin to be used more than a quarter of centaury ago and since that time, IT managers realized that the Advanced Mobile Phone System (AMPS) standard was not secure enough for authentication purposes because of caller fraud which was going to be increased. (Kurose, 2004) By the appearance of Cellular Digital Packet Data (CDPD) which provided 128-bit encryption for security purposes and Global System for Mobile communications (GSM) provided encryption and the implementation of user authentication techniques as part of the wireless standard, security flaws also appeared and IT managers faced with unlawful use of communications by un-authorized users, so new standards were defined. Code Division Multiple Access (CDMA) which specifies an unequalled code to each data packet and then disperses the packets thorough the air made it difficult for hackers to intercept the packages and brought more security for the devices which were designed to benefit from the wireless technology such as PDAs, Cell Phones and Laptops. (Kurose,2004) However the more technology improved, more and easier ways to intercept a wireless based structure appeared and this resulted companies to seek for more improved security if they wished to deploy their wireless networks. At the same time the wireless data networking is earning most of the marketplace notice, IT managers and the organizations which employ

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.