There are nine categories that range from security threats and errors removal of threats to personal privacy. All this represents a potential threat in wireless networks as well.
But, the main concern in wireless communication is theft of equipment, malicious hackers, malicious code, theft and industrial espionage and foreign. Theft can occur on wireless equipment for easy portability. User systems
Are entitled and not entitled to conduct fraud and theft, the user entitled more likely to do so. Because users of the system can know what resources are owned by a system and system security weaknesses, easier for them to conduct fraud and theft? Malicious hackers, sometimes called crackers, are the ones who get into the system without authority, usually for personal gratification or to commit a crime. Malicious hackers are usually people from outside the organization (although the organization Can a threat as well). Such hackers could get access to the access point wireless network with eavesdrop on wireless communications equipment. Malicious code include viruses, worms, Horse Trojans, logic bombs, or other unwanted software that is designed to damaging files or weaken the system. Theft of service occurs when the user is not entitled to gain access to the network and use network resources. Espionage and foreign industrial companies include the collection of confidential data, or intelligence information conducted by government eavesdropping. In wireless networks, the threat
Espionage by eavesdropping on radio transmissions can occur. The attack produced from this threat, if successful, placing the company's systems, and data at risk. Ensuring the confidentiality, integrity, authenticity, and availability are the main objectives of security policy of all governments.
No comments:
Post a Comment