Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Wireless Connectivity and Security ImplementationPurdue Glo, Lecture notes of Accounting

Wireless Connectivity and Security ImplementationPurdue Global UniversityWireless ConnectivityAs technology continues to advance over time, wireless connectivity provides a more convenient option to ensure all devices in a given setting are connected to the internet. Today, there are many devices we use that require internet capability for proper functionality such as: smartphones, tablets, streaming hardware, and other mobile devices. According Webopedia (2006) wireless networks use radio frequency technology (RF) and computers must have network adapters installed to connect to an access point. Network adapters typically come installed on the computer however, add-on adapters are available if the system does not come pre-equipped.Network security protocolsWireless networks are often accessed by multiple users and devices at a time and therefore require security protocols to ensure information is protected. Additionally, security protocols ensure the integrity of data as it is transm

Typology: Lecture notes

2023/2024

Available from 06/28/2024

helperatsof-1
helperatsof-1 🇺🇸

4

(3)

8K documents

1 / 5

Toggle sidebar

Related documents


Partial preview of the text

Download Wireless Connectivity and Security ImplementationPurdue Glo and more Lecture notes Accounting in PDF only on Docsity! Wireless Connectivity and Security Implementation Purdue Global University Wireless Connectivity As technology continues to advance over time, wireless connectivity provides a more convenient option to ensure all devices in a given setting are connected to the internet. Today, there are many devices we use that require internet capability for proper functionality such as: smartphones, tablets, streaming hardware, and other mobile devices. According Webopedia (2006) wireless networks use radio frequency technology (RF) and computers must have network adapters installed to connect to an access point. Network adapters typically come installed on the computer however, add-on adapters are available if the system does not come pre-equipped. Network security protocols Wireless networks are often accessed by multiple users and devices at a time and therefore require security protocols to ensure information is protected. Additionally, security protocols ensure the integrity of data as it is transmitted over a wireless connection. The ‘Secure Sockets Layer” (SSL) protocol provides data encryption and origin authentication to safeguard sensitive data and maintain a secure internet connection (IBM,2020). According to IBM (2020) the “Transport Layer Security” (TLS) protects data while being transferred by providing privacy and message authentication for data being transmitted through the FTP control. VPN’s (virtual private networks) can also be used to securely transmit data by creating a secure remote point which can only be accessed through authentication. VPN’s are used for same or business-to- business communication. Network Security and Management Tools
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved