Wirelss Security on Security Standard Policy: A Case Studty

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical factors and must ank what their risks are and then design a security policy that is cost effective and manageable. This paper shows variety of systems security on different network systems and then and rovide a solution to adjust security systems of wireless etwork on ecurity standard and also analyze case studies of how to eployed security systems.

Authors and Affiliations

Reza Amirpoor , Ajay Kumar , Satish R. Deavne

Keywords

Related Articles

A Handoff Technique to Reduce False-Handoff Probability in Next Generation Wireless Networks

Next Generation Wireless Systems (NGWS) include o-existence of current wireless technologies such as WLANs, WiMAX, General Packet Radio Service (GPRS) and Universal obile Telecommunications System (UMTS). The most impo...

Non-Linear Segmentation of Touched Roman Characters Based on Genetic Algorithm

The segmentation accuracy of Roman cursive characters, especially touched characters, is essential for the high performance of Optical Character Recognition Systems. This paper presents a new approach for non-linear seg...

Ontology driven Pre and Post Ranking based Information Retrieval in Web Search Engines

With the tremendous growth of World Wide Web, it has become necessary to organize the information in such a way that it will make easier for the end users to find the information they want efficiently and accurately. Thi...

Text Analytics to Data Warehousing

Information hidden or stored in unstructured data can play a critical role in making decisions, understanding and conducting other business functions. Integrating data stored in both structured and unstructured formats c...

Optimization Technique for Maximization Problem in Evolutionary Programming of Genetic Algorithm in Data Mining

The optimization technique is used for the identification of some best values from the various populations. The Evolutionary algorithm is used as a basic concept of the Evolutionary Programming Strategy. To solve many of...

Download PDF file
  • EP ID EP97264
  • DOI -
  • Views 119
  • Downloads 0

How To Cite

Reza Amirpoor, Ajay Kumar, Satish R. Deavne (2010). Wirelss Security on Security Standard Policy: A Case Studty. International Journal on Computer Science and Engineering, 2(4), 1067-1071. https://europub.co.uk/articles/-A-97264