2,502 research outputs found

    Reliability, availability and security of wireless networks in the community

    Get PDF
    Wireless networking increases the flexibility in the home, work place and community to connect to the Internet without being tied to a single location. Wireless networking has rapidly increased in popularity over recent years. There has also been a change in the use of the internet by users. Home users have embraced wireless technology and businesses see it as having a great impact on their operational efficiency. Both home users and industry are sending increasingly sensitive information through these wireless networks as online delivery of banking, commercial and governmental services becomes more widespread. However undeniable the benefits of wireless networking are, there are additional risks that do not exist in wired networks. It is imperative that adequate assessment and management of risk is undertaken by businesses and home users. This paper reviews wireless network protocols, investigates issues of reliability, availability and security when using wireless networks. The paper, by use of a case study, illustrates the issues and importance of implementing secured wireless networks, and shows the significance of the issue. The paper presents a discussion of the case study and a set of recommendations to mitigate the threat

    Individuals perceptions of wireless security in the home environment

    Get PDF
    Research in 802.11 wireless networking has in the past focused predominantly on corporate wireless network use, or identifying the flaws in wireless security. This study was aimed to determine the individuals’ perceptions of wireless security in the home environment. 163 volunteers completed a survey on their perceptions, knowledge, experiences and attitudes towards wireless networking. The results of the survey indicated that there is little difference in knowledge between those who had worked in the IT industry, and those who did not. The sources of information used to configure wireless networks are not improving the knowledge respondents had on wireless security. Respondents are aware of the various benefits of wireless networking. However, respondents do not appear to know the correct authentication and encryption methods which have been implemented on their wireless product

    Analysis of Vulnerabilities in IOT Devices and the Solutions

    Get PDF
    This thesis analyzes the insecurities in IOT devices, why these insecurities exist, and solutions to fix these vulnerabilities. IoT (Internet of Things) devices are nonstandard computing devices that connect wirelessly to a network that will transmit data. The amount of IOT devices continues to increase, as the demand for the items increases. It is predicted that there will be about 26 billion IOT devices installed by 2020. They have been improving on the amount of functionality they were previously able to do. For instance, Amazon’s Alexa is a speaker that can order items for you from the Amazon website, play your favorite music via Spotify, amazon music, or play music and much more. This requires Alexa to be logged into each one of those accounts to do this. With this information, there is a lot more personal information going in and out of the device. As the demand for the products increases, manufacturers begin to feel the pressure of having to push out products. They feel so much pressure that they skip important features of the IOT devices, including security. This lack of security opens users up to attacks and vulnerabilities from hackers that are trying to steal personal information. Therefore, consumers need to know the steps to take, in order to secure all their information, and the type of attacks and techniques hackers will use to get their private information

    What was the point? Raiding in the Summer of 1917

    Get PDF

    Arab Youth: A Contained Youth?

    Get PDF
    Young people in the Arab world increasingly have to struggle with economic hardship and difficulties to start their own lives, although the majority is better educated than ever before. The problematic labor market situation combined with weak public schemes to support young careers force large sections of young people to postpone their ambitions to marry. This period of delayed marriage is captured as 'waithood'. I will argue that this term is misleading. Two points of critique apply: The social dimension of waiting exceeds the status of remaining inactive until something expected happens; the ever-changing present continuously generates new realities. Simultaneously uncertainties and insecurities have dramatically expanded since 2011 and further limit livelihood opportunities and future perspectives, particularly of the youth. Young people are hence becoming both, increasingly frustrated and disadvantaged the longer they "wait", and even more dependent on parents and kin networks. This hinders them to develop their personality – they rather have to accommodate with values that are not always suitable to master the present requirements of a globalizing world. In this paper I will inquire, in how far young people of the Arab world have thus to be considered as a “contained youth”

    A Misuse-Based Intrusion Detection System for ITU-T G.9959 Wireless Networks

    Get PDF
    Wireless Sensor Networks (WSNs) provide low-cost, low-power, and low-complexity systems tightly integrating control and communication. Protocols based on the ITU-T G.9959 recommendation specifying narrow-band sub-GHz communications have significant growth potential. The Z-Wave protocol is the most common implementation. Z-Wave developers are required to sign nondisclosure and confidentiality agreements, limiting the availability of tools to perform open source research. This work discovers vulnerabilities allowing the injection of rogue devices or hiding information in Z-Wave packets as a type of covert channel attack. Given existing vulnerabilities and exploitations, defensive countermeasures are needed. A Misuse-Based Intrusion Detection System (MBIDS) is engineered, capable of monitoring Z-Wave networks. Experiments are designed to test the detection accuracy of the system against attacks. Results from the experiments demonstrate the MBIDS accurately detects intrusions in a Z-Wave network with a mean misuse detection rate of 99%. Overall, this research contributes new Z-Wave exploitations and an MBIDS to detect rogue devices and packet injection attacks, enabling a more secure Z-Wave network

    THE NEW GLOBALIZATION ERA AND DIGITALIZATION DEBATE: AN ECONOMISTS PERSPECTIVE

    Get PDF
    During the post-world war 11 period, industrialization was an irresistable trend, made global by the dynamics of international markets.Today, the industrial siciety faces the risks created by its own success. Its growth has been accompanied by a voracious use of natural resources and by increasing inequalities(insecurites)between industrial countries and the rest of the world. Infact, Industrialization to date has been based on energy and it has been and continues to be based on the burning of fossil fuels and the attendant emission of carbon dioxide, which can cause climate change. Thus, a vision of a new society in which humans live in harmony with each other and with nature is very imperative. This transition is described as digitalization(or knowledge revolution) driven by knowledge and by the technologies for processing and communicating it). This therefore requires new institutions and policies to reach a sustainable outcome by 2050.globalization digitalization knowledge revolution inequalities industrialization information emmissions insecurities

    Wi-Fi security : wireless with confidence

    Get PDF
    Since the IEEE ratification of the 802.11 standard in 1999, continuous exploits have been discovered compromising the confidentiality, integrity and availability of 802.11 networks. This paper describes the justification for a project to assess the security status of wireless network usage in society. It reviews the status of both commercial and residential approaches to wireless network security in three major Victorian cities, Melbourne, Geelong and Mornington, in Australia. By War Driving these suburbs, actual data was gathered to indicate the security status of wireless networks and give a representation of modern attitudes towards wireless security for the sample population. Preliminary results are presented to demonstrate the extent to which commercial or residential suburbs address wireless security. At this stage in the research further work is required to completely analyse the results. It is anticipated that the results will be useful for providing input into a defence and attack methodology for improving the security of both residential and commercial use of wireless networks
    • …
    corecore