IR, DR and BC with wireless mesh networks

  • Authors:
  • Kirk Inman;Humayun Zafar

  • Affiliations:
  • Kennesaw State University, Kennesaw, Ga;Kennesaw State University, Kennesaw, Ga

  • Venue:
  • Proceedings of the 2012 Information Security Curriculum Development Conference
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper examines wireless mesh network use in small businesses as well as large organizations and how they are compromised. This paper uses an evaluation approach to understanding how organizations protect their wireless mesh networks and how incident response, disaster recovery and business continuity plans are affected as a result. As network architectures continue to change, the use of wireless mesh networks are growing. Network monitoring and incident handling polices mechanisms are important and effective deterrents to computer abuse when they are actively enforced when using wireless mesh networks. This paper provides valuable considerations in developing a complete security policy when using wireless mesh networks in organizations.