Illusion of wireless security

Wai Sing, Alfred LOO

Research output: Book Chapters | Papers in Conference ProceedingsBook ChapterResearchpeer-review

1 Scopus Citations

Abstract

This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.
Original languageEnglish
Title of host publicationAdvances in Computers: 79
PublisherElsevier Inc.
Pages119-167
Number of pages49
ISBN (Print)9780123810274
DOIs
Publication statusPublished - 1 Jan 2010

Fingerprint

Managers
Industry
Education

Keywords

  • Wi-Fi security
  • Wireless metropolitan area networks
  • bluetooth
  • smart phones
  • wireless security

Cite this

LOO, W. S. A. (2010). Illusion of wireless security. In Advances in Computers: 79 (pp. 119-167). Elsevier Inc.. https://doi.org/10.1016/S0065-2458(10)79003-3
LOO, Wai Sing, Alfred. / Illusion of wireless security. Advances in Computers: 79. Elsevier Inc., 2010. pp. 119-167
@inbook{eb101a0b2f4744f7a43b96f08bc175bb,
title = "Illusion of wireless security",
abstract = "This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.",
keywords = "Wi-Fi security, Wireless metropolitan area networks, bluetooth, smart phones, wireless security",
author = "LOO, {Wai Sing, Alfred}",
year = "2010",
month = "1",
day = "1",
doi = "10.1016/S0065-2458(10)79003-3",
language = "English",
isbn = "9780123810274",
pages = "119--167",
booktitle = "Advances in Computers: 79",
publisher = "Elsevier Inc.",
address = "United States",

}

LOO, WSA 2010, Illusion of wireless security. in Advances in Computers: 79. Elsevier Inc., pp. 119-167. https://doi.org/10.1016/S0065-2458(10)79003-3

Illusion of wireless security. / LOO, Wai Sing, Alfred.

Advances in Computers: 79. Elsevier Inc., 2010. p. 119-167.

Research output: Book Chapters | Papers in Conference ProceedingsBook ChapterResearchpeer-review

TY - CHAP

T1 - Illusion of wireless security

AU - LOO, Wai Sing, Alfred

PY - 2010/1/1

Y1 - 2010/1/1

N2 - This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.

AB - This chapter examines the misunderstanding of wireless security from user behavior perspectives. Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. These problems must be rectified quickly due to expanding use of wireless facilities. Corporations also underestimate the potential dangers. IT managers do not provide enough education and support for users’ wireless connections at home or public places. IT managers are not paying enough attention to issues and that pose a serious threat. Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use. Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). As technology alone will never be able to solve all security problems, enhancement of the coordination between employers and end-users is required. In addition to discussing the truths and myths, countermeasures are presented to rectify these problems. This chapter differs from other security papers in that the minutiae of technical terms (such as algorithms, details of data frames, etc.) are avoided as far as possible so it can reach a wider audience.

KW - Wi-Fi security

KW - Wireless metropolitan area networks

KW - bluetooth

KW - smart phones

KW - wireless security

UR - http://commons.ln.edu.hk/sw_master/4068

U2 - 10.1016/S0065-2458(10)79003-3

DO - 10.1016/S0065-2458(10)79003-3

M3 - Book Chapter

SN - 9780123810274

SP - 119

EP - 167

BT - Advances in Computers: 79

PB - Elsevier Inc.

ER -

LOO WSA. Illusion of wireless security. In Advances in Computers: 79. Elsevier Inc. 2010. p. 119-167 https://doi.org/10.1016/S0065-2458(10)79003-3