- Posted by: essay
- Category: Free essays
At the same time, some organizations attempt to use wireless technologies to secure data within organizations because wireless technologies may be not connected to external, conventional networks. As a result, organizations can maintain the effective communication within organizations and share information using their wireless networks, whereas to communicate with their business partners or clients, they may use conventional networks. However, many specialists (Viardot, 2001) argue that such seeming security of wireless technologies is erroneous and they are not absolutely secure.
Moreover, some specialists (Lin, et al., 2003) argue that wireless technologies are vulnerable to information breaches even more than conventional technologies and networks. Specialists argue that it is more difficult to trace the intrusion or unauthorized access, if wireless technologies and networks are used because intruders use wireless technologies and it is difficult to locate them, in contrast to conventional networks and technologies, which allow locating intruders relatively easy and fast. In fact, wireless technologies grant mobility not only for users but also for intruders. In such a way, one of the major advantageous of wireless technologies, their mobility, turns out to be highly controversial because intruders may also use the mobility of wireless technologies to have the unauthorized access to private information or secret data stored and transmitted with the help of wireless technologies or within wireless network.
In such a context, it is possible to speak one of the major threats associated with the use of wireless technologies, the threat of hacking/cracking (Frodigh, et al., 2000). In fact, wireless technologies still fail to provide the high level of information security and the risk of unauthorized access from the part of hackers/crackers persists. In this regard, the compatibility of wireless networks and devices with conventional networks and devices increases the risk of hacking/cracking even more because hackers and crackers can access devices using wireless technologies and comprising a part of a wireless network using conventional technologies. As a result, wireless technologies and devices may be exposed to the risk of unauthorized access and information breaches.
Illegal computer crimes
In this regard, it is worth mentioning another risk, which is closely related to hacking and cracking, the risk of illegal computer activities, which also raise the problem of unauthorized access to private information. Unlike hacking and cracking, illegal computer activities lead to illegal activities, such as identity theft or the misuse of the private information of individuals or secret data of organizations (Lin, et al., 2003). At this point, it is worth mentioning the fact that illegal computer activities are particularly dangerous because wireless technologies and wireless networks cannot be absolutely protected from them as well as conventional technologies. At the same time, along with technological problems of protection of wireless technologies, devices and networks from illegal computer activities, there is also a problem of legal regulations of operations conducted with the help of wireless technologies or related to the use of wireless technologies. To put it in simple words, the lack of legal regulation and protection of wireless technologies and wireless networks from external intrusion increases the risk of illegal computer activities leading to substantial harms and damages to users of wireless technologies and networks. At this point, it is worth mentioning the fact that the illegal computer activities may lead to the loss of important information by organizations as well as by individuals. Moreover, this information may be misused and cause substantial harm to individuals and organizations. As a result, specialists (Frodigh, et al., 2000) argue that wireless technologies should increase the level of information security, whereas legislators should implement stricter legislation to protect wireless technologies, devices and networks from intrusion from the part of hackers, crackers, and computer criminals.
Natural/Environmental Threats. Along with human-related problems and challenges, wireless technologies may face external, natural threats. In this regard, some specialists (Cavin, et al., 2002) argue wireless technologies are still dependent on hardware and conventional technologies and there are many external, natural factors that may interfere in the work of wireless devices and networks. At this point, it is possible to refer to early wireless devices and technologies, which have a relatively low degree of reliability because they failed to work stably under the impact of external, natural factors. Today, developers of wireless technologies have solved many problems and increased the stability and reliability of wireless technologies but still, in case of a natural disaster, wireless technologies may fail to work properly and effectively (Lin, et al., 2003). In this regard, it is important to understand that wireless technologies are still dependent on hardware and, as a rule, they are compatible with conventional devices and technologies, which may be damaged by natural disasters. As a result, wireless technologies and devices also fail to function properly. In such a situation, the negative impact of environment makes wireless technologies vulnerable to malfunctioning but, unlike human-related threats, natural factors cannot always be prevented or avoided through the improvement of wireless technologies (Cavin, et al., 2002). For instance, it is possible to cope with the shutdown of electricity but wireless technologies can hardly stand serious natural disasters, such as earthquakes.