Assessing Wireless Security Implementation in Government and Private Sector Companies in Malacca–A Case Study (original) (raw)
Related papers
Awareness toward wireless security policy: Case study of International Islamic University Malaysia
2013 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), 2013
Wireless communication has become a very interesting sector for the provision of wireless access network, and available almost anytime and anywhere and the popularity is high. As wireless devices are used in offices, houses and universities, the need for strong and secure transport protocols seems to be one of the most important issues in wireless standards. Many organizations today are faced with all kinds of challenges related to security and privacy of their wireless network. In this case, IIUM community wireless access is not an exception, having thousands of subscribers from both staffs and students. Therefore, this paper discusses the current challenges faced by IIUM community wireless network. Specifically, issues that affects the security and privacy of student's data. The target of the study is to examine the awareness and usage of wireless security policy among IIUM students. The results of the in-depth interview and survey revealed that there several wireless security challenges to IIUM wireless security and low student's awareness. Other findings and recommendations were also highlighted in this paper.
Managing Wireless Security in an Organization
International Journal of Scientific & Technology Research
The adoption of wireless mobile computing solutions has been of benefit to government institutions, commerce and learning institutions among others. This is because of the higher customer satisfaction and higher productivity that have been made possible. A wireless network is a computer network, which is not connected by cables. This assists business enterprises and organizations by facilitating a flexible environment and avoids the capital cost of installing cabling in a building. The network is implemented by use of radio waves for transmission. This paper will discuss how to handle wireless security in an organization.
WIRELESS SECURITY IN MALAYSIA: A SURVEY PAPER
Journal of Critical Reviews, 2020
This paper evaluates the wireless 802.11 (WLAN) security of residents in a major city in Malaysia by collecting and analyzing passively data traffic of coffee shops and companies using particular tools on Kali Linux operating system in order to drag people attention to use more secured wireless environment. The paper evidently shows the lack of security awareness among people which may expose their privacy to threats.
2020
The purpose of this study was conducted to determine the level of wireless network vulnerability using ISSAF with penetration testing and make plans, assessments, and evaluation reports of wireless network security that can be used as guidelines for conducting penetration testing on an organization or company. The study was conducted with an action research approach which was divided into several stages, namely diagnosing, action planning, intervention, evaluation, and reflection. Then for the wireless network security evaluation process by applying ISSAF Penetration Testing. The results of testing the level of wireless network vulnerability of PT. Keberlanjutan Strategis Indonesia using ISSAF with penetration testing shows that the overall results of the four types of testing show the average level of a vulnerability is 0.8, in other words, the overall wireless network at PT. Keberlanjutan Strategis Indonesia has a high level of vulnerability. The outputs from each phase, namely th...