Layered Security Approach for Mobile Computing
Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wirele...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | eng eng |
Published: |
2011
|
Subjects: | |
Online Access: | https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uum-etd.2654 |
---|---|
record_format |
uketd_dc |
spelling |
my-uum-etd.26542022-04-10T23:52:20Z Layered Security Approach for Mobile Computing 2011 Abiodun, Bakare Mustapha Mohamad Tahir, Hatim Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Sciences QA71-90 Instruments and machines Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wireless network against any possible threat from unauthorized users from coming into the network. Five layered security levels was discussed in the literature review as an effective means of securing any wireless network from cyber terrorists attacks. The main objective of this research is to deploy Authentication and Access Control security measures under the Network layer security approach, which happens to be one of the steps involved in securing mobile computing devices using layered security approach. The methodology for the research was adopted from SDLC which include Planning, Analysis, Design, Implementation and Evaluation. Consequently, the findings of the research was hoped to motivate and encourage organizations to incorporate and deploy layered security approach in improving and enhancing their network security against any possible attacks from external mobile users. 2011 Thesis https://etd.uum.edu.my/2654/ https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf text eng public https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf text eng public masters masters Universiti Utara Malaysia |
institution |
Universiti Utara Malaysia |
collection |
UUM ETD |
language |
eng eng |
advisor |
Mohamad Tahir, Hatim |
topic |
QA71-90 Instruments and machines |
spellingShingle |
QA71-90 Instruments and machines Abiodun, Bakare Mustapha Layered Security Approach for Mobile Computing |
description |
Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wireless network against any possible threat from unauthorized users from coming into the network. Five layered security levels was discussed in the literature review as an effective means of securing any wireless network from cyber terrorists attacks. The main objective of this research is to deploy Authentication and Access Control security measures under the Network layer security approach, which happens to be one of the steps involved in securing mobile computing devices using layered security approach. The methodology for the research was adopted from SDLC which include Planning, Analysis, Design, Implementation and Evaluation. Consequently, the findings of the research was hoped to motivate and encourage
organizations to incorporate and deploy layered security approach in improving and enhancing their network security against any possible attacks from external mobile users. |
format |
Thesis |
qualification_name |
masters |
qualification_level |
Master's degree |
author |
Abiodun, Bakare Mustapha |
author_facet |
Abiodun, Bakare Mustapha |
author_sort |
Abiodun, Bakare Mustapha |
title |
Layered Security Approach for Mobile Computing |
title_short |
Layered Security Approach for Mobile Computing |
title_full |
Layered Security Approach for Mobile Computing |
title_fullStr |
Layered Security Approach for Mobile Computing |
title_full_unstemmed |
Layered Security Approach for Mobile Computing |
title_sort |
layered security approach for mobile computing |
granting_institution |
Universiti Utara Malaysia |
granting_department |
Awang Had Salleh Graduate School of Arts & Sciences |
publishDate |
2011 |
url |
https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf |
_version_ |
1747827397450792960 |