Implementing Security in a Client/Server Wireless Local Area Network
Computer network evolves with birth of Wireless Local Area Network (WLAN). Tangible benefits such as increase employee satisfaction and productivity drive enterprise WLANs adoption. However, security remains the most significant, but least understood in information technology. In the year 2001, ac...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2004
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/1169/1/CHONG_YIN_PENG.pdf https://etd.uum.edu.my/1169/2/1.CHONG_YIN_PENG.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.1169 |
---|---|
record_format |
uketd_dc |
spelling |
my-uum-etd.11692013-07-24T12:10:44Z Implementing Security in a Client/Server Wireless Local Area Network 2004 Chong, Yin Peng Sekolah Siswazah Graduate School TK5101-6720 Telecommunication Computer network evolves with birth of Wireless Local Area Network (WLAN). Tangible benefits such as increase employee satisfaction and productivity drive enterprise WLANs adoption. However, security remains the most significant, but least understood in information technology. In the year 2001, academic researchers reported vulnerability in IEEE 802.11b Wired Equivalent Privacy (WEP) protocol. Solutions from IEEE 802.11 IETF, Wi-Fi Alliance and OEMs are studies for secure wireless solutions. A baseline WLAN which is solely secured by WEP is established. Concerns and security issuess related to WLAN polled by Network Computing in 2002 is used to formulate the interview questions. Interviews with network engineers reviewed security issues and threats during enterprise WLAN deployment. Deploying and maintaining a secure WLAN is governed by three factors. The first factor is technology. Integration of WEP with Virtual Private Networking (VPN) and IPSec, plus 802.1X coupled with EAP and RADIUS server, on existing centralized administration database and security and enable block access at multiple layers of the network. Besides technology, people and process also dictate security in WLAN. Employees should be trained constantly on IT Security Policy and empowered to enforce IT Security, as security is very employee's responsibility. It is a mandate to establish an IS Security Policy to regulate all process and best known methods to constinuously maintain security of the enterprise. 2004 Thesis https://etd.uum.edu.my/1169/ https://etd.uum.edu.my/1169/1/CHONG_YIN_PENG.pdf application/pdf eng validuser https://etd.uum.edu.my/1169/2/1.CHONG_YIN_PENG.pdf application/pdf eng public masters masters Universiti Utara Malaysia |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
topic |
TK5101-6720 Telecommunication |
spellingShingle |
TK5101-6720 Telecommunication Chong, Yin Peng Implementing Security in a Client/Server Wireless Local Area Network |
description |
Computer network evolves with birth of Wireless Local Area Network (WLAN). Tangible benefits such as increase employee satisfaction and productivity drive enterprise WLANs adoption. However, security remains the most significant, but least understood in information technology. In the year 2001, academic researchers reported vulnerability in IEEE 802.11b Wired Equivalent Privacy (WEP) protocol. Solutions from IEEE 802.11 IETF, Wi-Fi Alliance and OEMs are studies for secure wireless solutions. A baseline WLAN which is solely secured by WEP is established. Concerns and security issuess related to WLAN polled by Network Computing in 2002 is used to formulate the interview questions. Interviews with network engineers reviewed security issues and threats during enterprise WLAN deployment. Deploying and maintaining a secure WLAN is governed by three factors. The first factor is technology. Integration of WEP with Virtual Private Networking (VPN) and IPSec, plus 802.1X coupled with EAP and RADIUS server, on existing centralized administration database and security and enable block access at multiple layers of the network. Besides technology, people and process also dictate security in WLAN. Employees should be trained constantly on IT Security Policy and empowered to enforce IT Security, as security is very employee's responsibility. It is a mandate to establish an IS Security Policy to regulate all process and best known methods to constinuously maintain security of the enterprise. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Chong, Yin Peng |
author_facet |
Chong, Yin Peng |
author_sort |
Chong, Yin Peng |
title |
Implementing Security in a Client/Server Wireless Local Area Network
|
title_short |
Implementing Security in a Client/Server Wireless Local Area Network
|
title_full |
Implementing Security in a Client/Server Wireless Local Area Network
|
title_fullStr |
Implementing Security in a Client/Server Wireless Local Area Network
|
title_full_unstemmed |
Implementing Security in a Client/Server Wireless Local Area Network
|
title_sort |
implementing security in a client/server wireless local area network |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Sekolah Siswazah |
publishDate |
2004 |
url |
https://etd.uum.edu.my/1169/1/CHONG_YIN_PENG.pdf https://etd.uum.edu.my/1169/2/1.CHONG_YIN_PENG.pdf |
_version_ |
1747827086672789504 |