Security in Wireless Local Area Networks

Security in Wireless Local Area Networks Sami Uskela Department of Electrical and Communications Engineering Helsinki University of Technology [email protected] Abstract When the wireless communications is coming to the offices and the homes, there are some new security issues to be taken care of. Today we have continuously growing markets for the wireless LANs, but there is big black hole in the security of this kind of networks. This paper gives an overview of the security functions specified in two wireless LAN standard, namely in the IEEE 802.11 and the HIPERLAN. There is also some discussion about the threats and vulnerabilities in wireless networks compared to wired networks. And last but not least the protocols and mechanisms needed in the secure wireless LAN are described. Table of Contents Introduction 2 Abbreviations and Definitions 3 Standards 3.1 HIPERLAN 3.2 IEEE 802.11 4 Threats and Vulnerabilities Compared to Wired LANs 4.1 Eavesdropping 4.2 Transitive Trust 4.3 Infrastructure 4.4 Denial of Service 5 Secure Solution 5.1 Design Goals 5.2 Design Overview 5.3 Authorization 5.4 Integrity and Confidentiality 5.5 Key Change Protocol 5.6 Key Management 5.7 Solution Analysis 6 Conclusions 7 References Introduction Around 1980 was the concept of the wireless LAN introduced and since 1985 have many companies tried to implement

  • Word count: 7709
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

NETWORK BASED DIFFUSION OF KNOWLEDGE IN MEDICINE

NETWORK BASED DIFFUSION OF KNOWLEDGE IN MEDICINE Valerie Owunna, K0835950 MSC Information System with Management CIM 951- Research Methods Kingston University London Abstract The paper is based on the network diffusion of knowledge in medicine. In the medical field there has been a pressing need to integrate functions from disparate and diverse distribution information system to enhance knowledge dissemination. The paper describes all the systems of the MedWeaver Architecture with emphasis on the how the MedWeaver integrates medical diagnostic decision support using DXplain, its literature searching using WebMedline and retrieval of clinically useful web site using CliniWeb. WebMedline make uses of UMLS Metathesaurus as a translator. The paper has also covered the advantage and future challenges of using MedWeaver. The conclusion summarises some main ideas found while preparing this paper and also the importance of using MedWeaver technology in the medical field. . Introduction Young,M.A.(1967) stated that "the ultimate objective of most health education activities is to change individual, group, community, or societal behaviour." The traditional health and practices of the lay public, in cooperating the changing nature of health needs and the continuing appearance of research findings relevant to the developing practices and procedures to meet these needs argue

  • Word count: 4541
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Availability of electronic information

Introduction In this section I will be focusing on the impact of electronic information on individuals and the society, and how ICT has helped with the growth of organisations and how it has helped them to communicate with customers more. ICT has seen a great explosion of users with ICT being popular within organisations and businesses. ICT is an easy way to communicate within organisations. ICT is an important service that keeps organisations functioning. Not just in businesses and organisation I will also be focusing on what kind of impact ICT has had on individuals and households. In today's society more and more people have access to the internet from home and more and more people are developing their ICT skills with more and more people working from home. Also many people create documents and presentations for work. And also sending emails through the internet has allowed people to communicate more; they can communicate with friends or family in different countries rather than using the telephone which is very expensive. Internet access In 2007, about 15 million households in Great Britain had access to the Internet (61%). This is an increase of over 1 million households over 2006 (7%) and almost 4 million households more since 2002 (36%). The regions that had the highest access to the internet were the South West and London both with 61%. The regions with the

  • Word count: 1410
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Disaster Recover Plan

Disaster Recovery Plan (DRP) October 25, 2008 Disaster recovery is the process, policies and procedures of restoring operations critical to resume business functions, including regaining access to data (records, hardware, software, etc.), communications (incoming, outgoing, toll-free, fax, etc.), workspace, and other business processes after a natural or human-induced disaster. To increase the opportunity for a successful recovery of valuable records, a well-established and thoroughly tested disaster recovery plan must be developed. This task requires the cooperation of a well-organized committee led by an experienced chairperson. A disaster recovery plan (DRP) should also include plans for coping with the unexpected or sudden loss of communications and/or key personnel, which the focus is data protection. Disaster recovery planning is part of a larger process known as business continuity planning (BCP). The key elements are to analyze the risk. First there must be a list of all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common manmade threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of the hearts are the most likely to occur and prioritize them using a simple

  • Word count: 586
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

JP Morgan IT system. The agreement stated that IBM would take over tasks from JP Morgan such as hosting computer centres, running help desks, distributing applications, maintainging data and voice networks as well as hosting trading applications for JP M

Contents Content Page Number Front Cover 1 Content 2 Introduction 3 JP Morgan's needs 4 JP Morgan's past system 5 Outsourcing 6 JP Morgan and IBM 7 JP Morgan and Bank One 8 Disadvantages of an Information system 9 Disadvantages of an Information system 10 Types of information systems 11 JP Morgan's IS system 12 Methodology 13 Value Chain 14 Ethics 15 Conclusion 16 Bibliography 17 JP

  • Word count: 4486
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Research for a secure IT system to manage data for the Old Age Pension system in Tanzania.

CHAPTER ONE .0. INTRODUCTION What is Old Age Pension (Benefit)? Old age pension is the pension given to Member of the Social Security Scheme due to Old Age. Pension is a term expresses all long term benefits offered by the scheme. It defines all principal payments given to a retired or invalid member to replace the income lost due to old age or inability to continue with work and it includes all periodic payments made to dependant of the deceased insured person. .1 BACKGROUND TO THE PROBLEM All peoples throughout all of human history have faced the uncertainties brought on by unemployment, illness, disability, death and old age. In the realm of economics, these inevitable facets of life are said to be threats to one's economic security. For the ancient Greeks economic security took the form of amphorae of olive oil. Olive oil was very nutritious and could be stored for relatively long periods. To provide for themselves in times of need the Greeks stockpiled olive oil and this was their form of economic security. In medieval Europe, the feudal system was the basis of economic security, with the feudal lord responsible for the economic survival of the serfs working on the estate. The feudal lord had economic security as long as there was a steady supply of serfs to work the estate, and the serfs had economic security only so long as they were fit enough to provide their

  • Word count: 4512
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Organizational Information System

Introduction Super Television Ltd is a constantly growing TV manufacturing company. It has recently entered the international market. That is an important step for the company. As the international market is even more competitive, the company had to find ways to make its performance more efficient and gain a competitive advantage and therefore make more profit. This report will illustrate how Super TV is divided in many departments, and how they work. I shall show how the information flows in the organisation and how these departments interface with each other. I will describe the importance of information systems and its role in integrating new technology and in decision making processes. The report will also include the exploitation of electronic commerce and the consequences of it. Task 1 Super TV is a business, so it is considered to be a human-made system (Elliott 2004, p.49). It is divided into more sub-systems (see appendix 1) and according to the systems theory (Wikipedia 2007) Super TV as a business information system is concerned with the flow of data and information between different departments (sub-systems) throughout the whole organisation. The flow of information between departments is essential for the company to be effective and efficient in its activities. Figure 1 is an illustration of the flow of information in Super TV between its departments, when a

  • Word count: 3779
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Acceptability of Biometric Security System

Acceptability of Biometric Security System Author: S.M Sarwarul Islam Rizvi Author: Mohammad Sifatullah Bhuiyan Course: Scientific Writing and research methodology Group: 101 Date: 2010-01-07 Table of Contents Abstract 1 Introduction 2 .1 Background 2 .2 Description of the Research area 3 .3 The purpose of the Research and its role within the research area 3 .4 Goal and Audience 3 2 Materials and Methods 4 2.1 Research Question 4 2.2 Literature Review 4 2.3 Observation and Primary Hypothesis 5 2.4 Testing the Hypothesis by real life survey 6 2.4.1 Subjects 6 2.4.2 Measures 6 2.4.3 Procedure 7 3 Result 8 4 Analysis of the results 11 5 Conclusions and discussion 13 5.1 Conclusions 13 5.2 Discussion 13 5.3 Suggestions for future Research 15 6 References 16 Abstract Various systems need to uniquely identify its users and also to verify their identity. Example of such system is secure access in buildings, data centre, personal computers and laptops, mobile phone and ATM machines etc. To accomplish the task, the systems need a method that can be based on 'what the user knows', 'what the user has' or 'what the user is'. Traditional password based authentication system is based on 'what the user knows'. And biometrics authentication system or biometrics is based on 'what the use is'. The main goal of this paper is to find out the acceptability of

  • Word count: 4420
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Businees Informations Needs

Sampled for Internal Verification IV's Name Date HE ASSIGNMENT FRONT SHEET Programme Title: Higher National Diploma Computing Year One Unit Number/Title: Unit 16 Information Systems Title of Assignment: Assignment 1: Business Information Needs Assignment Internally Verified by: Kelly Pook Date: Tutor Name: Fran MacKenzie Issue Date: 3/10/2008 Submission Date: 0/11/2008 Student Name: Module Criteria Assessed Unit Crit Criteria Assessed Met 6 .1 compare and contrast the different functional areas of an organisation 6 .2 understand the information needs of each functional area 6 .3 analyse the information needs for a given scenario or case study Merit Descriptors Assessed 6 3.1 The appropriate structure and approach has been used You must apply a digital signature to the assignment front sheet to attest that the work is entirely your own unless otherwise stated in the body of the assignment. Failure to do this will invalidate your submission. Statement of Authentication: I declare all work within the submitted assignment to be entirely my own unless otherwise stated and that I fully understand the college disciplinary process for plagiarism. Print Student Signature: George Kennett Date: 0/11/2008 Date Received: Received by: Assignment one- Business Information Needs To be able to compare and contrast the different functional

  • Word count: 1878
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay

Visual Basic

Visual Basic Research Report Student Information System (SIS) Table of Contents .History 3 2.Introduction 3 3.What is Visual Basic? 4 4.Why use Visual Basic? 4 5.Importance of Visual Basic 4 6.Components of Visual Basic 4 7.Features of Visual Basic 5 8.Visual Basic and 3-Tier Architecture for SIS 6 9.Features of SIS 7 0.Using VBScript for SIS...................................................................................................8 1.Pros of Visual Basic.......................................................................................................8 2.Cons of Visual Basic......................................................................................................9 3.Conclusion 10 4.Recommendations 11~12 6.Glossary 13 7.Appendix 14~17 8.References 18~19 . History VB 1.0 was introduced in 1991. The drag and drop design for creating the user interface is derived from a prototype form generator developed by Alan Cooper and his company called Tripod. Microsoft contracted with Cooper and his associates to develop Tripod into a programmable form system for Windows 3.0, under the code name Ruby (no relation to the Ruby programming language). Tripod did not include a programming language at all. Microsoft decided to combine Ruby with the Basic language to create Visual Basic. The Ruby interface generator provided the "visual" part of

  • Word count: 2651
  • Level: University Degree
  • Subject: Mathematical and Computer Sciences
Access this essay