User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia

At the time of information technology, the development of technology runs rapidly for the needs of the users themselves. Internet access is very important to obtain any desired information around the world. As well as the internet, it develops rapidly. High mobility of the users is in need of access...

Full description

Saved in:
Bibliographic Details
Main Author: Lubis, Arif Ridho
Format: Thesis
Language:eng
eng
Published: 2012
Subjects:
Online Access:https://etd.uum.edu.my/3238/1/ARIF_RIDHO_LUBIS.pdf
https://etd.uum.edu.my/3238/3/ARIF_RIDHO_LUBIS.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.3238
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
advisor Mohamad Tahir, Hatim
topic T Technology (General)
spellingShingle T Technology (General)
Lubis, Arif Ridho
User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
description At the time of information technology, the development of technology runs rapidly for the needs of the users themselves. Internet access is very important to obtain any desired information around the world. As well as the internet, it develops rapidly. High mobility of the users is in need of access that can be connected all the time to the electronic device which is owned by the user. A wireless access is one of the exact solutions being applied at the present time. A security network is necessary to keep the rights of the wireless access user and security is one of the most important priorities. Security can be applied by the user or provider of communication services themselves. Because of the danger's security could be from anywhere. There are many factors that can disturb the network security. This project attempt to use the questionnaire methodology to the users of Wi-Fi in the Universiti Utara Malaysia, particularly at SOC building, to find out the perception of the users toward Wi-Fi security service provided by Universiti Utara Malaysia. All participants were SOC students with the total of 873 populations. The sample size used in this project was 109 students. The confidence level stated was 92% which represent a high confidentiality. This study found that the user aspect has a positive relation with the security aspect.
format Thesis
qualification_name masters
qualification_level Master's degree
author Lubis, Arif Ridho
author_facet Lubis, Arif Ridho
author_sort Lubis, Arif Ridho
title User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
title_short User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
title_full User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
title_fullStr User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
title_full_unstemmed User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia
title_sort user perceptions of wi-fi security service in universiti utara malaysia
granting_institution Universiti Utara Malaysia
granting_department Awang Had Salleh Graduate School of Arts & Sciences
publishDate 2012
url https://etd.uum.edu.my/3238/1/ARIF_RIDHO_LUBIS.pdf
https://etd.uum.edu.my/3238/3/ARIF_RIDHO_LUBIS.pdf
_version_ 1747827528112799744
spelling my-uum-etd.32382016-04-25T08:47:17Z User Perceptions of Wi-Fi Security Service in Universiti Utara Malaysia 2012-12 Lubis, Arif Ridho Mohamad Tahir, Hatim Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Arts and Sciences T Technology (General) At the time of information technology, the development of technology runs rapidly for the needs of the users themselves. Internet access is very important to obtain any desired information around the world. As well as the internet, it develops rapidly. High mobility of the users is in need of access that can be connected all the time to the electronic device which is owned by the user. A wireless access is one of the exact solutions being applied at the present time. A security network is necessary to keep the rights of the wireless access user and security is one of the most important priorities. Security can be applied by the user or provider of communication services themselves. Because of the danger's security could be from anywhere. There are many factors that can disturb the network security. This project attempt to use the questionnaire methodology to the users of Wi-Fi in the Universiti Utara Malaysia, particularly at SOC building, to find out the perception of the users toward Wi-Fi security service provided by Universiti Utara Malaysia. All participants were SOC students with the total of 873 populations. The sample size used in this project was 109 students. The confidence level stated was 92% which represent a high confidentiality. This study found that the user aspect has a positive relation with the security aspect. 2012-12 Thesis https://etd.uum.edu.my/3238/ https://etd.uum.edu.my/3238/1/ARIF_RIDHO_LUBIS.pdf text eng validuser https://etd.uum.edu.my/3238/3/ARIF_RIDHO_LUBIS.pdf text eng public masters masters Universiti Utara Malaysia D.D.Coleman & D.A.Westcott, CWNA Certified Wireless Network Administrator Official Study Guide: Exam PW0-104: John Wiley & Sons, 2009. K.Beaver & P.T.Davis,Hacking Wireless Networks For Dummies. USA: John Wiley & Sons, 2011. Frank Ohrtman, & Konrad Roeder, “Wi-Fi H&book Building 802.11B Wireless Networks,” McGraw-Hill 2003. M.Gast, 802.11 Wireless Networks: The Definitive Guide: O'Reilly Media, 2011. Willinsky, "Oxford Dictionary," ed: Oxford University Press, 2010. [6] Anthony Reyes, Cyber Crime Investigations. USA: Syngress, 2008. A.H.Lashkari, M.M.S.Danesh, & B.Samadi, "A Survey on Wireless Security protocols (WEP, WPA & WPA2/802.11i)," p.5, 2009. A.-M.A.Al-Abdullah, "Wi-Fi Communication System," Electromagnetic 2009. Patrick LaRoche & A.N.Zincir-Heywood, "Genetic Programming Based Wi-Fi Data Link Layer Attack Detection," p.8, 2006. EEE-SA St&ards Board,ANSI/IEEE Std 802.11, 1999 Edition (R2003). New York: IEEE, 1999. M.RudyantoArief, "Wireless Security," TeknikInformatika, STMIK AMIKOM, 2009. C.C. McGeoch, Design of Experiment for Computer Science & Mathematics. Amherst: Amherst College, 2009 Telecommunication, "Telecommunications Services Satisfaction Survey of Residence Halls – Spring 2011," Michigan Tech University, 2011. S.Miller, Experimental Design & Statistics: New Essential Psychology 2 vol. 1: Routledge, 2006. H.Redwan & K.-H.Kim, "Survey of Security Requirements, Attacks & Network Integration in Wireless Mesh Networks," Department of Information & Communication Engineering, p. 5, 2008. A.H. Lashkari, F.Towhidi, & R.S.Hoseini, "Wired Equivalent Privacy (WEP)," 2009. A.C.Ijeh, A.J.Brimicombe, D.S.Preston, & C.O.Imafidon, "Security Measures in Wired & Wireless Networks," 2009. Broadcom, "Wi-Fi for the Mobile & Video Generation," Broadcom Corporation p. 6, 2012.. All rights reserved. McAfee, "Network Protection Industry-Leading Network Security Solutions," Network Security Platform Version 5.1, 2010. D.Fischer & B.Markscheffel, "State of the Art in Wireless LAN Security Results & Implications of an Empirical Study concerning German Companies & Federal Authorities," Institute of Electrical & Electronics Engineers, Ilmenau University of Technology, 2009. A.Makanju, A.N.Zincir-Heywood, & E.E.Milios, "Adaptability of a GP Based IDS on Wireless Networks," p. 9, 2008, DOI 10.1109/ARES.2008.50 C.Y.Jeong, B.H.Chang, & J.C.Na, "A Survey on Visualization for Wireless Security," Fourth International Conference on Networked Computing & Advanced Information Management, IEEE, p.4, 2008, DOI 10/1109/NCM.2008.187 Y.Zhiyu, Z.Linwei, & L.Wenna, "Study on Security Strategy of Wireless Mobile Office System," First International Workshop on Education Technology & Computer Science, p.4, 2009. Z.Zheng, J.Wang, & J.Wang, "A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications," Communications Society subject matter experts for publication in the IEEE, p.6, 2009. S.Misra, P.V.Krishna, H.Agarwal, A.Saxena, & M.S.Obaidat, "A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things " IEEE International Conferences on Internet of Things, & Cyber, Physical & Social Computing, p. 9, 2011. M.M. Aye, "A Queuing Analysis of Tolerating for Denial-of-Service (DoS) Attacks with a Proxy Network" International Conference on Computer Engineering & Technology, IEEE, p.3, 2009. S.karthik, R.M.Bhavadharini, & D.V.P. Arunachalam, "Analyzing Interaction Between Denial Of Service (Dos) Attacks & Threats," IEEE International Conferences on Internet of Things, & Cyber, Physical & Social Computing, p.9, 2008. J.Bi, P.Hu, & P.Li, "Study on Classification & Characteristics of Source Address Spoofing Attacks in the Internet," Ninth International Conference on Networks, p. 5, 2010. P.Noiumkar & T.Chomsiri, "Top 10 Free Web-Mail Security Test Using Session Hijacking " Third 2008 International Conference on Convergence & Hybrid Information Technology, 2008 J.J.Pauli, P.H.Engebretson, M.J.Ham, & M-C.J.Zautke, “Cookie Monster: Automated Session, Hijacking, Archival, & Analysis”, Eighth International Conference on Information Technology: New Generations, 2011 Y.Zhang, X.Liao, S.Ji, C.Lin & Y.Wang, “Research of FWM Eavesdropping Attack Detection Method Based on the Comparison of OSNR”, IEEE, 2011 Dushuqin & Qin Yi, “WLAN Security System based on the 802.1 & AES” International Conference on Computer Application & System Modeling (ICCASM), 2010 Z.Wang , Meizhen Liu, Qixian Cai & Jie Li, “Improving Project for Security & Secrecy’s Risk of WLAN Management” Proceedings Of 2008 3rd International Conference On Intelligent System & Knowledge Engineering, 2008 D. Shiyang, “Compare of New Security Strategy With Several Others in WLAN” College of computer & communications engineering of Weifang University, IEEE, 2010 Dr. Muhammad Idrus, Metode Penelitian Ilmu Social Pendekatan Kualitatif Dam Kuantitatif Edisi Kedua. Jakarta: Penerbit Erlangga, 2012 T.Hassinen, “Overview of WLAN security”, TKK T-110.5290 Seminar on Network Security, 2006 NIST Computer Security Division, Advanced Encryption St&ard, Retrieve from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, 2012 C.R.Kothari, Research Methodology: Methods & Techniques. New Delhi: New Age International, 2008. S.Gayal & Dr. S.A.V. Manickam, “Wireless LAN Security Today & Tomorrow” Center for Information & Network Security Pune University, 2009 V.Wekh&e, "Wi-Fi Technology: Security Issues," Rivier Academic Journal, vol.2(2), p.17, 2006. Zhenzhen Gao, Yu-Han Yang& K.J. Ray Liu,“Anti-Eavesdropping Space-Time Network Coding for Cooperative Communications”, IEEE, 2011 F.C.V. Bennekom, Customer Surveying: A Guidebook for Service Managers: Customer Service Press, 2002. Adel Ismail Al-Alawi, “WiFi Technology: Future Market Challenges & Opportunities” Journal of Computer Science, 2006 P.LaRoche & A.N Z-Heywood, “Genetic Programming Based WiFi Data Link Layer Attack Detection”, Faculty of Computer Science, 2006 R.A. Kent, Data Construction & Data Analysis For Survey Research: Palgrave Macmillan, 2001. L.L. Khine, “A New Variant of RC4 Stream Cipher” World Academy of Science, Engineering & Technology, 2009 J. Pallant, SPSS Survival Manual: A Step by Step Guide to Data Analysis Using the SPSS Program: Allen & Unwin, 2011. J.A. Gliem & R.R. Gliem, Calculating, Interpreting, & Reporting Cronbach’s Alpha Reliability Coefficient for Likert-Type Scales. Colombus: The Ohio State University, 2003. G.R.Walden, Polling & Survey Research Methods, 1935-1979: An Annotated Bibliography: Greenwood Publishing Group, 1996. E.R. Babbie, The Practice of Social Research: Cengage Learning, 2010. U.Sekaran, , & R.Bougie, “Research Methods for Business: A Skill Building Approach , 2003 S.B.Green, N.J.Salkind, & T.M.Akey, Using SPSS for Windows: Analyzing & Understanding Data, New York: Prentice Hall, 1997.