Saturday, September 7, 2019

Balance between wireless security and performance Thesis Proposal

Balance between wireless security and performance - Thesis Proposal Example This physical connection is easily detected and can be traced to the eavesdropper. This as a result has made the wireless security be under scrutiny since it fails to offer the appropriate security. The security risks that accompany the wireless environment are quite exposing. The amount of security that should be incorporated in the system normally depends on the size and the nature of information being handled by the organization as well as on the devices being used (Dawoud 56). The first and foremost way is to maintain a full understanding of that particular networks topology. This understanding is important as it creates an improvement to the system design whenever the need arise. These improvements are important in optimization of the performance of that system. This is important especially where there is periodic assessment of the security controls and their performance (Hirani 39). This research shall seek to come up with a way of securing the wireless network and enhance the security levels to satisfaction. The research shall propose devices that shall also aid the mobility for the wireless devices. Many scholars have come up with writings assessing the performance of wireless devices. They have come up with ways of maintaining the wireless networks as well as how to create the same. Maintaining a secure network should be a continuous activity that keeps going on. It should be assessed regularly in terms of performance and if there is need to upgrade or improve the technology that is being used (William 78). Keeping inventories of the equipments that are used in that wireless network is also a good way of ensuring performance. In addition, having back up for the transactions and the communications is also important to secure the system (Erica et al. 44). There should be a wide usage of inherent security features. An example of these

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.