Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Executives Summary of Wireless Security Tools

Category: Computer Sciences Paper Type: Dissertation & Thesis Writing Reference: IEEE Words: 1500

The research study focuses on the analysis and identifications of wireless security tools. It also explores the analysis of the various security tools in order to provide good services to the users of the wireless devices. This study is conducted by using the secondary source of data collection and the qualitative research method is employed in this study. For the qualitative research method, the studies of the several other authors are taken as the example Roundabout 140 studies of the various authors are analyzed but few of them are discusses in the study due to the time taking facts of the interviews. The simple random sampling techniques are used as the sampling techniques for this research study according to a qualitative research method. Under this procedure of collecting the data from the previous studies the time span is selected from last year’s 05 2015-2019. The various studies of various authors from the last 05 years have been selected randomly in order to analyze the Wireless Security Tools. There are most important tools that are discussed in this study and these are;         

Introduction of Wireless Security Tools

The services and infrastructure of wireless communication have been blooming during the recent decades along with major objectives of the meeting due to which the demand is growing rapidly. It has been indicated in the latest statics that is released by the Union of International telecommunication in 2013.

These statics represents that the amount of mobile subscribers has been growing rapidly and it reached 6.8 billion worldwide as well as it has occupied more than 40% of the total population of the world. While it has been indicated in the several reports that the rapidly growing numbers of the wireless devices are misused for the cybercriminal illicit activities. It includes online bullying/stalking, computer hacking, financial information theft, malicious attacks and so on. It has become the cause of big loss round about 83billion euros along with the approximate 556 million users worldwide impacted by using cybercrime every year.

According to the report of the Norton cybercrime of 2012 the security issues of the wireless network are increasing with the passage of time.  Thus, it is considered the one of the most important in order to improve the security of wireless communication for fighting against the activities of cybercrime each year particularly due to the utilization of wireless devices by more and more people. Such as it commonly used for personal emails, online banking and owning for the widespread utilization of smart phones [1].

Generally, the architecture of the OSI protocols adopted by the wireless networks. These are contained on the layers of the applications such as; physical layers, transports layers, Mac layers and network layers that are usually protected separately from each of the layers in order to acquire the requirements of the securities. The security requirements are referred to as the availability, authenticity, integrity and confidentiality. As indicated in the below-given figures methodologies for the main wireless security including encryption, authentication and authorization for the various diverse design factors such as the communication latency security level and implementation complexity required to be balanced.


Figure 1: Wireless security methodologies and design factors of Wireless Security Tools

Source: [1]

Security is referred to as an essential consideration. All aspects related to computing must be taken in it and particularly in mobile computing due to the several threats that occur in the life of mobile users. Sometimes these threats cannot be exposed to the user of traditional computing. The stooling and lose of the sensitive and private data of the mobile user are considered as the major threats which can easily store for their devices. Sometimes this data can be used badly by various threats and hackers. The threats of the computing system can be defined in various manners as a situation that has the possibility for the damage, loss and cause for this system.  The mobile computing is considered as the capabilities for computing which can easily rely upon the infrastructure of the preexisting distributed systems.

In terms of WSN the threats of the security particularly differ from the non-energy and wired constraints for the wireless networks. Due to the typical properties of the WSNs the variances occur in the various items. For WSN the energy is considered as an essential constraint as well as fir its particular three components of the security. It also includes the various kinds of the three components; availability, confidentiality and integrity. The energy is considered as basic concepts [2].

The explanations for all of these security elements explain below in order to analyze the security threats for its particular uses.

Confidentiality of Wireless Security Tools

According to the paradigm of the cybersecurity the confidentiality is one of the most important well-known as well as paid attention components.  Users were struggling to send the data without disclosing the contents for attackers. It is considered the easiest task in the communication of the wireless networks it is easiest to listen to understand data that is sent in networks.

Integrity of Wireless Security Tools

It is considered as the data protection according to the modified reports through the unauthorized sides and unwanted data. The environment can be easily monitored by using the network of wireless sensors. They are engaged in working for the evaluation sensed data from these environments.

Availability of Wireless Security Tools

It leads towards the ranges of the variety of the observed attacks, it has been observed easily that few of the attacks are particularly targeting the data which is transferred throughout the whole network. In order to make sure the not working of the network there are few other attacks that are usually not working.

Energy of Wireless Security Tools

There are various energy constraints and all of these are engaged in affecting plans of the security. The limited energy has been lemmatized by the computational resources [3].

1.1.Problem Statement of Wireless Security Tools

Due to the rapid growth of the innovations in technologies the word is moving toward the smart working ad smart industry. Everything is transferring to the latest technologies. The trends of wireless technologies have become more common and it has made human life easier and convenient. As human beings are becoming the victims of wireless technologies due to this the demand for the demands of the wireless security tools will also increase. There are a lot of the research studies that are conducted to develop or maintain and explores the working of wireless network security tools but there is a lack of analysis for the wireless network security tools.      

1.2.Aims and objectives of Wireless Security Tools

There are several aims of this study that will be attained in the next chapters of the research study but the most important and major objectives of the research study are explored in such manners. These are;

·         To analyze the wireless security tools along with its features, functioning and design.

·         To explore the importance of wireless security tools.

·         To access the proper authentication of the wireless security tools by comparing it with various other security tools.

1.3.Organization of the paper of Wireless Security Tools

The research study contains on the five major sections and these sections are explains below with brief descriptions

Introduction: It is the first section of the study which introduces the title of the study along with the strong justification. In this section the problem statement is defined and objectives are also developed.

Literature review: this section of the research study explores the related works of the various authors in order to emphasize the objective and attaining the objectives.

Methodology: It is the third section of the study that explains the methods and materials that are adopted in order to conduct the research study.

Results and analysis: This is the fourth chapter of the research study and central point of the study because it explores completes results of the study that have been observed and the required tools are also explained in this part of the study.

Conclusion: It is the last and final chapter of the study and concluded the main aim and objectives of the research along with the entire work that has been conducted in this study.

References of Executives Summary of Wireless Security Tools

[1]

Y. Z. J. W. X. &. H. L. Zou, " A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends.," Proceedings of the IEEE, , vol. 104, no. 9, p. 1727–1765., 2016.

[2]

O. &. S. O. K. Can, " A survey of intrusion detection systems in wireless sensor networks.," 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO)., 2015.

[3]

R. S. Rakhi Budhran, "Wireless Local Area Networks: Threats and Their," International Journal of Advanced Networking Applications (IJANA), 2015.

 

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed