Network and Wireless Network Security

System of computers that are joined together so that they can communicate by exchanging information and sharing resources. Information and communication are two of the most important strategic issues for the success of every enterprise. While today nearly every organization uses a substantial number of computers and communication tools ( telephones, fax, personal handheld devices), they are often still isolated. While managers today are able to use the newest applications, many departments still do not communicate and much needed information cannot be readily accessed. Networks are important because they help strengthen and support your business. Networks can be formal or informal. You should also consider joining a women’s association - where you will find a larger group of women, and resources that you should take advantage of - such as information on contracts and seminars on various subjects. Main advantages for Networking like Flexible if there is adhoc situation when additional workstation was required, Implementation cost is cheaper than wired network and also disadvantages in system like Lower speed compared to wired network ,Less secure because hacker’s laptop can act as Access Point., If you connected to their laptop, they’ll read all your information (username, password.. bla..bla..bla..). The more complicated network technologies such as Novell’s IPX, IBM’s SNA, Microsoft’s NetBEUI, Apple’s AppleTalk and the Internet’s TCP/IP are even more diverse, and much more complicated. Wireless is a term used to describe telecommunications in which electromagnetic waves carry the signal over part or all of the communication path. Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above the range of human hearing; these are also sometimes classified as wireless. The two primary motivations for choosing a wireless network over a wired approach are the flexibility and the cost-savings associated with eliminating cables and wires. The financial benefits of using wireless for remote monitoring are compelling; yet, industry has been slow to adopt the technology. Security, reliability, integration, and power are all challenges that must be overcome before there is widespread adoption of wireless measurement systems.

[1]  Yi-Wen Liu,et al.  Design and implementation of WIRE1x , 2003 .

[2]  Anand R. Prasad,et al.  Fast authentication methods for handovers between IEEE 802.11 wireless LANs , 2004, WMASH '04.

[3]  Matthew S Gast 802.11 Wireless Networks: The Definitive Guide, Second Edition , 2005 .

[4]  Matthew S. Gast,et al.  802.11 Wireless Networks: The Definitive Guide , 2002 .

[5]  William A. Arbaugh,et al.  Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .

[6]  Bernd Becker,et al.  Securing wireless networks in a university environment , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[7]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[8]  Jyh-Cheng Chen,et al.  Wireless LAN security and IEEE 802.11i , 2005, IEEE Wirel. Commun..

[9]  Nilufar Baghaei,et al.  IEEE 802.11 wireless LAN security performance using multiple clients , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[10]  Moshe Kam,et al.  A secure wireless agent-based testbed , 2004, Second IEEE International Information Assurance Workshop, 2004. Proceedings..

[11]  Alessandro Neri,et al.  Integrated security architecture for WLAN , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[12]  John C. Mitchell,et al.  Analysis of the 802.11i 4-way handshake , 2004, WiSe '04.