Buy essay on Wireless technologies

This chapter presents the analysis of the data collected in the course of the study and analysis of possible solutions to identified risks and threats to wireless technologies.
The findings of the current study reveals the fact that the problem of external threats to data and information stored and transmitted via wireless technologies exists. In this regard, the major threats are human-related ones, especially hacking and cracking, whereas illegal computer activities are secondary at the moment. However, in the future, illegal computer activities can become more widely-spread along with the expansion of wireless technologies and their mass implementation. At the same time, natural disasters also expose wireless technologies and their users to certain risks but these risks are comparable to risks associated with conventional technologies. In this regard, specialists suggest developing new information systems, which take into consideration specificities of wireless technologies and increase the effectiveness of the data protection while using wireless technologies. At the same time, the increase of awareness of users of existing risks may be an effective preventive measure as well because many users have proved to be careless in relation to using wireless technologies and they have had a low level of data security concerns. In addition, the current study reveals the fact that IT specialists, experts and users are quite optimistic in regard to the future development of wireless technologies, because users are ready to use wireless technologies even more than they do now, whereas IT specialists and experts forecast the further progress and wider use of wireless technologies.
Conclusions

Thus, taking into account all above mentioned, it is important to place emphasis on the fact that the current study has revealed the fact that wireless technologies keep progressing and their use is likely to increase in the future. At the moment, it is possible to identify human-related threats, such as hacking/cracking and illegal computer activities, as the major threats to wireless technologies and their users. At the same time, natural disasters may be also quite harmful for wireless technologies.
Recommendations

Therefore, the further development of wireless technologies should involve the development of effective information systems and focus on the data protection as one of the primary concerns of developers of wireless technologies. They should pay more attention to possible threats and forecast human-related threats as well as develop effective preventive measures to minimize such threats. As for natural disasters and environmental threats, they are hard to forecast but still improvements are needed to make wireless technologies less vulnerable to the negative impact of natural or environmental factors.

 

REFERENCES
Andrew, S. (2003). Tanenbaum, Computer Networks (4th Ed), Prentice Hall.
Barrett, C. et al., (2002). “Characterizing the Interaction Between Routing and MAC Protocols in Ad-hoc Networks,” Proc. MobiHoc, pp. 92-103
Behzad, R. (2003). Principles of Data Conversion System Design. New York: Random House.
Broch, J. et al., (1998). “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” Proc. Mobicom ’98.
Cavin, D. et al., (Oct. 2002). “On the accuracy of MANET simulators,” Proc. ACM Workshop on Princ. Mobile Computing
(POMC’02), pp. 38-43.
Frodigh, M. et al, (2000). “Wireless Ad Hoc Networking: The Art of Networking without a Network,” Ericsson Review, No. 4,.
Kim, D. K. (August 2003).”A New Mobile Environment: Mobile Ad Hoc Networks (MANET),” IEEE Vehic. Tech. Soc. News, pp. 29-35.
Lin, Tao et al., (WCNC 2003). “A Framework for Mobile Ad Hoc Routing Protocols,” Proc. IEEE 2003 Wireless Comm. and Networking Conference.
Pawlikowski, K. et al., (January 2002). “On Credibility of Simulation Studies of Telecommunication Networks,” IEEE Communications Magazine, pp. 132-139.
Viardot, E. (2001). Successful Marketing Strategy for High-Tech Firms. New York: New Publishers.

 



Author: essay
Professional custom essay writers.

Leave a Reply