Six keys to improving wireless security

Erik Graham, Paul Steinbart

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter presents a step-by-step approach to improving the security of wireless networks. It describes the basic threats to achieving the security objectives of confidentiality, integrity, and availability when using wireless networking. It also explains various countermeasures that can be used to reduce the risks associated with wireless networks. This chapter has two main objectives. The first is to provide managers with practical guidance for improving the security of their organization's wireless networks. The second objective is to summarize the issues and concerns associated with the use of wireless networking so that researchers can identify fruitful areas in need of further investigation.

Original languageEnglish (US)
Title of host publicationHandbook of Research on Information Security and Assurance
PublisherIGI Global
Pages393-401
Number of pages9
ISBN (Print)9781599048550
DOIs
StatePublished - 2008

Fingerprint

Wireless networks
Managers
Availability

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Graham, E., & Steinbart, P. (2008). Six keys to improving wireless security. In Handbook of Research on Information Security and Assurance (pp. 393-401). IGI Global. https://doi.org/10.4018/978-1-59904-855-0.ch034

Six keys to improving wireless security. / Graham, Erik; Steinbart, Paul.

Handbook of Research on Information Security and Assurance. IGI Global, 2008. p. 393-401.

Research output: Chapter in Book/Report/Conference proceedingChapter

Graham, E & Steinbart, P 2008, Six keys to improving wireless security. in Handbook of Research on Information Security and Assurance. IGI Global, pp. 393-401. https://doi.org/10.4018/978-1-59904-855-0.ch034
Graham E, Steinbart P. Six keys to improving wireless security. In Handbook of Research on Information Security and Assurance. IGI Global. 2008. p. 393-401 https://doi.org/10.4018/978-1-59904-855-0.ch034
Graham, Erik ; Steinbart, Paul. / Six keys to improving wireless security. Handbook of Research on Information Security and Assurance. IGI Global, 2008. pp. 393-401
@inbook{17bd057e13df4a9f966b41e3aac3b5c7,
title = "Six keys to improving wireless security",
abstract = "This chapter presents a step-by-step approach to improving the security of wireless networks. It describes the basic threats to achieving the security objectives of confidentiality, integrity, and availability when using wireless networking. It also explains various countermeasures that can be used to reduce the risks associated with wireless networks. This chapter has two main objectives. The first is to provide managers with practical guidance for improving the security of their organization's wireless networks. The second objective is to summarize the issues and concerns associated with the use of wireless networking so that researchers can identify fruitful areas in need of further investigation.",
author = "Erik Graham and Paul Steinbart",
year = "2008",
doi = "10.4018/978-1-59904-855-0.ch034",
language = "English (US)",
isbn = "9781599048550",
pages = "393--401",
booktitle = "Handbook of Research on Information Security and Assurance",
publisher = "IGI Global",

}

TY - CHAP

T1 - Six keys to improving wireless security

AU - Graham, Erik

AU - Steinbart, Paul

PY - 2008

Y1 - 2008

N2 - This chapter presents a step-by-step approach to improving the security of wireless networks. It describes the basic threats to achieving the security objectives of confidentiality, integrity, and availability when using wireless networking. It also explains various countermeasures that can be used to reduce the risks associated with wireless networks. This chapter has two main objectives. The first is to provide managers with practical guidance for improving the security of their organization's wireless networks. The second objective is to summarize the issues and concerns associated with the use of wireless networking so that researchers can identify fruitful areas in need of further investigation.

AB - This chapter presents a step-by-step approach to improving the security of wireless networks. It describes the basic threats to achieving the security objectives of confidentiality, integrity, and availability when using wireless networking. It also explains various countermeasures that can be used to reduce the risks associated with wireless networks. This chapter has two main objectives. The first is to provide managers with practical guidance for improving the security of their organization's wireless networks. The second objective is to summarize the issues and concerns associated with the use of wireless networking so that researchers can identify fruitful areas in need of further investigation.

UR - http://www.scopus.com/inward/record.url?scp=84898398122&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84898398122&partnerID=8YFLogxK

U2 - 10.4018/978-1-59904-855-0.ch034

DO - 10.4018/978-1-59904-855-0.ch034

M3 - Chapter

AN - SCOPUS:84898398122

SN - 9781599048550

SP - 393

EP - 401

BT - Handbook of Research on Information Security and Assurance

PB - IGI Global

ER -