Wirelss Security on Security Standard Policy: A Case Studty

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 4

Abstract

Administrators of a network have a variety of different uthentication and encryption technologies to choose from. Administrators must also take into account a variety of organizational factors, not just of technical factors and must ank what their risks are and then design a security policy that is cost effective and manageable. This paper shows variety of systems security on different network systems and then and rovide a solution to adjust security systems of wireless etwork on ecurity standard and also analyze case studies of how to eployed security systems.

Authors and Affiliations

Reza Amirpoor , Ajay Kumar , Satish R. Deavne

Keywords

Related Articles

JAX-WS Web Service for Transferring Image

Using Web Services, it is possible to send any type of information in any form of encryption. In this context, different techniques have been used to attach binary files in SOAP messages. Web services provide communicati...

Processor-Directed Cache Coherence Mechanism – A Performance Study

Cache coherent multiprocessor architecture is widely used in the recent multi-core systems, embedded systems and massively parallel processors. With the ever increasing performance gap between processor and memory, ther...

Solving Sparse Rating Problem Using Fine Grained Approach

Recommender System is a system that automatically recommends all similar kind of items that are of user interest. In design of the recommender systems rating is the crucial issue. Till today many algorithms have been pro...

Canonical Correlated Kernel PCA Method for Face Recognition

Practical face recognition systems are sometimes confronted with low-resolution face images. To address this problem, a super-resolution method that uses nonlinear mappings to infer coherent features that favor higher re...

INTENSIFICATION OF EDUCATIONAL CLOUD COMPUTING AND CRISIS OF DATA SECURITY IN PUBLIC CLOUDS

Cloud computing is an emerging technology that access emote servers through Internet to maintain data and pplications. It incorporates the advantages of grid and utility omputing. This paper expresses the mportance o...

Download PDF file
  • EP ID EP97264
  • DOI -
  • Views 114
  • Downloads 0

How To Cite

Reza Amirpoor, Ajay Kumar, Satish R. Deavne (2010). Wirelss Security on Security Standard Policy: A Case Studty. International Journal on Computer Science and Engineering, 2(4), 1067-1071. https://europub.co.uk/articles/-A-97264