Wednesday, April 24, 2019

Wireless Technology used in Business Application Essay

Wireless Technology used in Business covering - Essay ExampleNevertheless, even usual e-mail applications corresponds as a protection department threat for a potential enterprise if hackers gain the access to the network, or feed the network with viruses or other venomed software. IT managers must carefully appraise security risks involved with wireless applications and try to maintain proper security for the networks as is needed. This paper will address the issues regarding wireless technology and tries to discuss the positive and negative points of utilize this technology for business purposes.Cellular systems were begin to be used more(prenominal) than a quarter of centaury ago and since that time, IT managers realized that the Advanced Mobile Phone System (AMPS) standard was not secure enough for documentation purposes because of caller fraud which was going to be increased. (Kurose, 2004) By the appearance of Cellular Digital Packet selective information (CDPD) which pr ovided 128-bit encryption for security purposes and Global System for Mobile communications (GSM) provided encryption and the implementation of user enfranchisement techniques as part of the wireless standard, security flaws also appeared and IT managers faced with unlawful use of communications by un-authorized users, so new standards were defined.Code Division Multiple Access (CDMA) which specifies an unequalled code to each selective information packet and then disperses the packets thorough the air made it difficult for hackers to intercept the packages and brought more security for the devices which were knowing to benefit from the wireless technology such as PDAs, Cell Phones and Laptops. (Kurose,2004) However the more technology improved, more and easier ways to intercept a wireless based structure appeared and this resulted companies to seek for more improved security if they wished to deploy their wireless networks.At the same time the wireless data networking is earning most of the marketplace notice, IT managers and the organizations which enforce

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.