9,397 research outputs found

    Is Your Wireless Network Being Hacked?

    Get PDF
    Wireless networks provide vulnerable gateways for unauthorised entry to networks or even a standalone wireless computer. The independent radio signals that constitute wireless communications have no physical boundary to keep them in check. This allows a third party to easily eavesdrop on communications sessions and by capturing the data packets, they can break the encryption keys and access the data within the network. The public awareness of the insecurity of wireless networks is surprisingly poor despite frequent news media reports of the vulnerabilities of the equipment and the activities of the criminals prepare to exploit it. In this paper we review the security protocols commonly used on wireless networks and investigate their weaknesses by showing how easy it is to crack the codes using tools freely available on the Internet

    M-Commerce Implementation in Nigeria: Trends and Issues

    Get PDF
    Nigeria was described as the fastest growing telecoms nation in Africa and the third in the World. The country had experienced a phenomenal growth from a teledensity of 0.49 in 2000 to 25.22 in 2007. This trend has brought about a monumental development in the major sectors of the economy, such as banking, telecoms and commerce in general. This paper presents the level of adoption of ICT in the banking sector and investigates the prospects of m-Commerce in Nigeria based on strengths, weaknesses, opportunities and threats (SWOT) analysis. Findings revealed that all banks in Nigeria offer e-Banking services and about 52% of the offer some forms of m-Banking services. The banks and the telecoms operators have enormous potentials and opportunities for m-Commerce but the level of patronage, quality of cell phones, lack of basic infrastructure and security issues pose a major threat to its wide scale implementation
    corecore