Browsing Centre for Research in Distributed Technologies (CREDIT) by Authors
Awareness of wireless security by home and business usersMaple, Carsten; Jacobs, Helen; Reeve, Matthew (IADIS, 2006)There has been rapid increase in the popularity of wireless networks in both the home and the small office environment. However, with the convenience wireless networking brings there is also an added risk in terms of security. From surveys conducted in a number of countries, it appears there is still lack of awareness of the need for securing wireless networks and the level of security provided by the different wire less encryption protocols. With increasing quantities of e-Government services being available online, such as income tax returns, car registration and health-related services, it is important that the public are aware of the risks of submitting personal information on unsecured or weakly secured networks. This paper highlights the types of wireless encryption protocols available,the cost of using these protocols and provides recommendation for home and business users when us ing e-Government services.
Choosing the right wireless LAN security protocol for the home and business userMaple, Carsten; Jacobs, Helen; Reeve, Matthew (IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2006)The introduction and evolution of security standards for wireless networking has been a problematic process. Flaws in the initial security standard resulted in quick-fix solutions and interoperability issues. As wireless networks are not confined to a building, there is an added security risk that radio signals can be detected externally. Wireless networking has rapidly increased in popularity over the last few years due to the flexibility it provides. Given the simultaneous growth of e-government services there is particular risk to the citizen of identity theft. This article discusses the progression of wireless security protocols since their introduction and the effect this has had on home and business users. The risks of using wireless networks are outlined in the paper and recommendations for securing wireless networks are reviewed.