The adoption of wireless networks can be endangered for many reasons. The authentication challenges are worst when the systems are prone to access by unauthorized users. The encryption protocol for protecting sensitive data from manipulation and exposure is critical. The rapidly changing trends in computing means that specialized applications are no longer being used for the original design purpose. Combining specializations requires the integration of diverse technologies that may not be compatible. Incompetent users of the wireless networks and mobile devices are also significant contributors to the security challenges. (Kumar, Manjunath & Kuri, 2008)
Key risks associated with using wireless networks and mobile devices are similar. Research indicates that hackers and malicious people can successfully maneuver their way through firewalls. A successful access to a system is a good platform to affect many other attacks including service denial and information manipulation. Disclosure of the packets transmitted over the network is possible unless the encryption is effective.
A key risk in the application of handheld devices is the susceptibility to theft, breakdown loss. Since users tend to walk around with their mobile devices they are easily lost which is not a problem with personal office computers. Research also indicates that most people tend to lose their mobile devices before their use has been fully exploited and all the benefits have been realized. Loss of mobile devices means loss of crucial data. Wireless networks also lack stability under certain circumstances such as power breakdowns which make reconfiguration of the devices necessary. (Kumar, Manjunath & Kuri, 2008)
An extensive assessment of the known risks will ensure the best chance for effectiveness and reliability of wireless networks. Concrete strategies are required. The first step is the recognition of the possible risks and then the next steps are risk management plans and implementation. Setting a good security protocol protects the wireless networks and mobile devices from breakdown and loss. Backups of the data stored in these devices should be created. Such a plan for risk management is also cost-effective in terms of operability and the economic issues. The benefits to concerned parties are immeasurable.
Cyber security is a daily risk that wireless network users and providers are experiencing. Cyber security requires enormous short-term expenditures. The short term expenditures for defensive mechanisms may lead to more expenditures resulting in large costs that appear to be unrealistic to many people. (Brian, 2010) Cyber security systems that permanently shift the power to the defender from the attacker are well worth the price. Continually experiencing the enormous cost of maintaining cyber security must ensure the power is with the user not the hacker. Individuals, society and organizations should be extensively involved in research and development on the issue of cyber security systems. The objective is to achieve a permanent strategy for the problem. that can be used effectively.
The reduction of cyber security system maintenance cost is essential. Many reasons cause threats to adoption and use of wireless networks in organizations the need wireless to enhance the daily activities. Authentication challenges are key and the systems must not allow unauthorized users access. Encryption is necessary for securing any sensitive data from manipulation and exposure. With the changing trends in the computing world, use of applications that were originally designed for other areas of specializations and integration of so many diverse technologies are upcoming challenges. Incompetent users of the wireless networks are also significant contributors to the security challenges facing the wireless networks and mobile devices. (Kumar, Manjunath & Kuri, 2008)
Key risks associated to wireless networks and the use of mobile devices face just the some risks as those prone to the wired networks. Research indicates that hackers and malicious people have in the past managed t get access to the systems by successfully managing to maneuver their way through the firewalls set in place. A successful access to the system gives such people a good platform to affect many other attacks like denial of service and manipulation of information. If encryption is not effectively done on the wireless networks, then disclosure of the packets transmitted over the network is a possibility.
Another key risk in the application of handheld devices is the susceptibility to theft, breakdown or just normal loss. Since users will always walk around with their mobile devices, they are more prone to loss as opposed to desktop computers that are always in the offices. Research also indicates that most people tend to lose their mobile devices before their use is exploited and their benefits realized. Loss of these devices means loss of crucial data. Wireless networks also lack some aspects of stability under given circumstances. For instance, when there are cases of power breakdowns, wireless networks are rendered unstable, and some configurations may need to be done to restore their stability. (Kumar, Manjunath & Kuri, 2008)
Cyber security can require enormous expenditures. Expenditures are for defensive mechanisms that may require additional funding to ensure security. The high costs appear to be unrealistic to many people. (Brian, 2010) Cyber security systems must permanently shift the power to the user away from the attacker. The cost of maintaining cyber security must ensure that the power is always on the user’s side not the hackers. Individuals, and organizations the society, should be extensively involved in research and development on the issue of cyber security system. The objective of this move is to achieve a permanent strategy for solving this problem. If not permanent, a flexible solution that is closer to a permanent solution should be discovered. A cost reduction plan for maintaining cyber security systems is essential. (Garg, 2007)
The technology behind wireless networks is also a principal cause of the challenges. Communication in wireless networks entirely depends on radio transmissions whereas wired networks make use of cables for sending data. Not enough computer experts understand the technology behind wireless networks. Therefore, attempts to carry out an analysis of the risks associated with the technology are prone to failure. Troubleshooting connection problems in wireless networks causes a unacceptable need for downtime that damages the effectiveness of an organization. (Garg, 2007)
Multiple diverse systems work together to create a wireless networks which can create loopholes that cause failures from inefficiency and limited capabilities. For instance, most of the devices used in wireless systems either have limited storage capacities or have no ability to store information. Other devices work under strict conditions like the case of infrared devices. These devices can only work using direct lines of communication across the transmission line and the receiving ends. This is also true of stereo headsets that form a crucial part of the wireless networks.
Mobile devices are being equipped with wireless systems and applications like the GPS as the technology improves. Research also indicates that networking is moving towards wireless systems due to advances in technology. Many reasons exist for network experts to carry out studies that could lead to solutions to the problems experienced in wireless networking. Maximum protection should be ensured if confidentiality is to be achieved. Downtime should be eliminated. Risk assessment should be given a priority in the computing world.
As noted earlier, wireless technology is one aspect that is not easily understood by many people. It calls for a highly experienced information technology expert to identify the risks and develop counter strategies. It is evident that some professionals are helpless when they need to troubleshoot failure in the wireless network. For this very reason, I am convinced that the doctor needs an expert to handle his systems. Being an expert in A+, CISCO and server technologies, I am convinced I am best suited for the job as IT personnel in the office. I have a thorough understanding of networking and I am very experienced working with wireless networks.
Cyber security is yet another risk that wireless network users and providers are experiencing. It is also worth noting that cyber security is involved with enormous expenditures. These expenditures are for short term defensive mechanisms that require additional funding to get other mechanisms. This results to large costs that appear to be unrealistic to many people. (Brian, 2010. Therefore, cyber security systems should permanently shift the power to the defender from the attacker. It is not wise to keep on experiencing an enormous cost of maintaining cyber security yet the power remains with the attacker. In that case, the society, individuals and organizations should be extensively involved in research and development on the issue of cyber security system. The objective of this move is to achieve a permanent solution for this problem. If not permanent, a solution that is closer to a permanent solution should be discovered. Reduction of the cost involved with maintaining cyber security systems is crucial. (Garg, 2007)
Mobile devices are now being equipped with wireless systems networking is moving towards wireless systems. Therefore solutions are necessary to meet the challenges experienced in wireless networking. Confidentiality requires security that provides maximum protection. Risk assessment is a valuable tool that must never be ignored.
Wireless technology is requires an expert because so few people are familiar with the systems involved. Wireless technology calls for a highly experienced information technology expert to identify the risks and design the solutions needed. Professionals who are highly accomplished in other fields are not able to troubleshooting problems and even failures in the wireless network. For this very reason, I am convinced that the doctor needs an expert to handle his systems. Being an expert in A+, CISCO and server technologies, I am convinced I am best suited for the job for IT personnel in the office. I understand both networking and wireless technology very well.
References
Garg, V. K. (2007). Wireless communications and networking. Amsterdam: Elsevier Morgan Kaufmann.
Kumar, A., Manjunath, D., & Kuri, J. (2008). Wireless networking. Amsterdam: Morgan Kaufmann/Elsevier.