Wireless Security: Models, Threats, and Solutions
Wireless Security: Models, Threats, and Solutions
Managing a Network Vulnerability Assessment
Managing a Network Vulnerability Assessment
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Vulnerability Assessment in Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Investor perceptions of traditional and online channels
Communications of the ACM - Has the Internet become indispensable?
Wireless infidelity I: war driving
Communications of the ACM - End-user development: tools that empower users to create their own software solutions
The Ethical Hack: A Framework for Business Value Penetration Testing
The Ethical Hack: A Framework for Business Value Penetration Testing
Performance evaluation of e-commerce requests in wireless cellular networks
Information and Software Technology
Hi-index | 0.00 |
M-commerce, a growing sub-category of E-business, allows business to be done 'anywhere, anytime'. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals' use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the light of organizational culture the survey findings become more explicable. Senior management, and even IT staff, may still hold a traditional, 'wired network' view of their organization. Aspects of organizational culture also appear to limit the way WNVA users go about the assessment process. A cultural shift could help change users' perceptions about the risks and rewards of WNVAs. This could threaten IT staff's professional identity, however, and needs further research.