05-02-2013, 03:23 PM
A study on awareness level of security system in wireless network will influence message communicating inhabitants with special reference to Coimbatore district
1A study on awareness.doc (Size: 98.5 KB / Downloads: 28)
Abstract
Nowadays security plays an imperative responsibility in wireless network since the routing of information is through air. Many encryption methods were developed and are still developing by the research people to shelter their information from intruder. In the army, navy, military, explore etc., fields their information are secured via latest encryption methods implemented through both hardware and software. So it is not an easy job to an intruder to attack secured messages. But in habitual life numerous inhabitants were not having awareness of information security in wireless network even though they are communicating messages (which require secrecy) with many people. In some explore departments itself, they are verdict scores of problems but ahead of discovery to the solution, the same problems were smelled by intruder and they are receiving appraisal even though they are not the novel researchers. This article discuss about the awareness echelon of security in wireless network influences message communicating inhabitants. This process done by assessment amid inhabitants with a mixture of questions which involves network policies, password, email, encryption, unlicensed software etc.., used to quantify the awareness of security in wireless network.
Introduction
We are in the fast moving world and no one likes even less delay “If it is Delay! It is denied! Is the saying in the security services! So mostly we all use the fast communication channel that is nothing a wireless network, but most people do not aware of weakness of security in wireless network. Though people find gate to address and nurture the security ideas to inhabitants to secure their information in insecure wireless network. All the way back attackers getting more ease than the defenders; an attacker is extremely motivated to succeed in his work without concerning any security damage. Most of the successful organization requires alert and defend in all aspects “Known enemies are better than unknown intruders or attackers”. Perhaps enemies are known persons then we can easily predict the intention of attacks. Here the unknown represents we do not know who or how or when they will attack with what resources and for what purpose. It is really pathetic! We only know that they are highly motivated to succeed in their attacks on victims while the victims' greatest motivation is to succeed in their own organization objectives. Victims must defend everything of value in fixed, easily knowable locations while attackers only have to attack one thing of value. Motivation is the key to successful attacks and also for good security against such attacks. We must increase the security motivation in our organizations to approach the motivation of our enemies.
I Hate Security
We all hate security because of the inconvenience and the constraints it puts on us in performing our jobs. Remembering and using passwords, limiting information we may use, locking doors and computers, and having to use cryptographic protection are bothersome and detract from our work for which we are compensated. A popular approach to improve our wireless security attitudes and performance is through security awareness programs.
Suitcase the Best Wireless Network Policy
The effective management of information technology resources is remarkably important to the success of the academic, research, patient care and public service missions of the respective organizations. Because of the inherent nature of the wireless communication, wireless networks require increased cooperation and coordination between campus entities to maximize the technology’s benefits to the students, faculty, staff of different organizations, to allow connection to wireless networks in different campus buildings, and eventually, to facilitate the ability to roam from building to building without losing network connectivity. Each organization should frame their own wireless network policies and assigns responsibilities for the deployment of wireless services. Policies should be made with out ambiguity and simply in order to understand easily. Polices should focus on the issues that may arise when using wireless communication.
The Cease of Email
Communication is an essential part in every business environment whether it is a small company or a huge enterprise. Aside from meetings, conferences and brainstorming, written communication is very important in all aspects. It is the most efficient way to communicate and send business updates to other employees, superiors, clients, suppliers and important contacts. Sending emails has become one of the most used functions of the internet and in more ways than one, the most helpful as well. Exchanging messages is faster and significantly less expensive. Without the internet, the fastest way to do business and send an important message are via overseas calls, telegram messaging, mailing services or travelling directly to the place or country. Imagine the amount of money and time a businessman has to invest just to communicate with a client or partner and make business possible. With the presence of the internet and email service, sending and receiving messages can be done fast and efficiently without having to spend a lot of money and wasting a second. Productivity and profitability can be increased with faster communication.
Improper Email Habits
While email has enabled companies to market their businesses to a large audience, they should avoid spamming potential clients with endless messages. Instead, emails should be tailored to suit the interests of the potential client. The sender should avoid ccing more people than is truly necessary. There is little that is more frustrating than being copied in an email when the content is irrelevant. Email should never be used to send personal or confidential information—once an email is sent, it can easily be forwarded on to anyone, and could fall into the wrong hands. Email can be a very effective and strong tool if used correctly. Knowing what to avoid is crucial to maintaining professionalism at all times.
Securing Information through Encryption
There are various encryption methods are available to secure the messages. The messages to be encrypted, known as the plaintext, are transformed by a function that is parameterized by a key. The output of the encryption process, known as the cipher text, is then transmitted, often by messenger or radio. We assume that the enemy, or intruder, hears and accurately copies down the complete cipher text. However, unlike the intended recipient, he does not know what the decryption key is and so cannot decrypt the cipher text easily. Sometime the intruder can not only listen to the communication channel(passive intruder) but can also record messages and play them back later, inject his own messages, or modify legitimate messages before they get to the receiver(active intruder). The art of breaking ciphers, called cryptanalysis, and the art devising them (cryptography) is collectively known as cryptology.
It will often be useful to have a notation for relating plaintext, cipher text, and keys. We will use C = EK(P) to mean that the encryption of the plaintext P using key K gives the cipher text C. Similarly, P=DK(C ) represents the decryption of C to get the plain text again. It then follows that DK(EK(P))=P. This notation suggests that E and D are just mathematical functions, K is key. The only tricky part is that both are functions of two parameters, and we have written one of the parameters (the key) as a subscript, rather than as an argument, to distinguish it from the message.
Conclusion
Securing password is such a challenging task to protect the confidentiality in any electronic related factor to save the sources and mainly from the intruder has to concentrate on the individual and the software maintainer to meet their expectation. As a concluding example, take a look on the giant machine Google; it always monitors the performance of users in terms of length and duration of the password automatically and periodically respectively. Similarly habitats of email and maintenance are taking care of both individual and software maintainer. Any organization should frame and narrate the security policies to the employees and also to be trained to protect the same. Perhaps any change happen in the company policy will not violate the security system.