Ch 8: Wireless & Mobile Network Security

About This Chapter

This chapter provides a through overview of wireless and mobile network security topics. Complete these fun lessons and quizzes whenever you need to study these concepts for an upcoming exam, class assignment, work project or any other academic/professional need.

Wireless & Mobile Network Security - Chapter Summary

Check out this convenient online computer science chapter to learn essential concepts pertaining to the security of wireless and mobile networks. The chapter consists of short and engaging lessons that outline network risks and security threats, as well as methods for securing these types of networks and protecting information. When you're finished with a lesson, take the accompanying self-assessment quiz to reinforce key terms. You'll be able to access these resources online at any time of day or night, and our subject-matter experts will be happy to answer any questions you may have. By the end of the chapter, you should be able to:

  • Compare types of network security attacks and mobile device security threats
  • Identify a variety of wireless security issues and solutions
  • Recognize measures for securing wireless networks and mobile devices
  • Evaluate risks associated with the loss of mobile devices
  • Manage mobile device security
  • Compare types of authentication methods for mobile devices
  • Differentiate between user access levels for mobile devices
  • Prevent mobile device information leakage and protect mobile device locations

11 Lessons in Chapter 8: Wireless & Mobile Network Security
Test your knowledge with a 30-question chapter practice test
Types of Attacks in Network Security

1. Types of Attacks in Network Security

Network security specialists must face a wide variety of threats to their data and devices. In this lesson, we'll look at a number of the different types of attacks that can occur.

Wireless Network Security Issues & Solutions

2. Wireless Network Security Issues & Solutions

Anything being broadcasted, such as data over a wireless network, can potentially be intercepted. In this lesson, we'll examine security for wireless networks and how data can be protected from theft and malicious use.

How to Secure a Wireless Network: Best Practices & Measures

3. How to Secure a Wireless Network: Best Practices & Measures

Keeping your information safe starts with keeping a safe wireless network. In this lesson, we look at the best measures to keep WiFi networks secure, from simply encrypting data to restricting device access.

Mobile Device Security Threats, Risks & Issues

4. Mobile Device Security Threats, Risks & Issues

The rise of mobile devices has led to a whole new set of threats, risks, and issues. In this lesson, we're going to examine how organizations and individuals seek to keep their mobile devices secure and protect the data on them.

Securing Mobile Devices: Types & Identification

5. Securing Mobile Devices: Types & Identification

Odds are you probably own and use a smartphone, laptop, or other mobile device on a daily basis. In this lesson, we will discuss what mobile devices are and some of the ways to secure them from attacks. We will also briefly review some of the major ways in which mobile devices have affected the modern work environment.

Loss of Mobile Devices: Risks & Remediation

6. Loss of Mobile Devices: Risks & Remediation

In this lesson, learn about the risks of losing a phone or any mobile device that holds personal information or organizational information. Explore some preventive measures that can be implemented and also some actions that should be taken in the event of loss or theft.

Mobile Device Security Best Practices & Management

7. Mobile Device Security Best Practices & Management

With the number of devices that are connected to your data on the rise, it is essential to be aware of the best practices to keep them secure as well as to protect your data.

Authentication for Mobile Devices: Types & Effectiveness

8. Authentication for Mobile Devices: Types & Effectiveness

Mobile devices are a very dominant force in the world of technology, and we need to be able to secure them from harm's way properly. This lesson will go over the different types of mobile authentication methods and their uses.

Differentiating User Access for Mobile Devices

9. Differentiating User Access for Mobile Devices

In this lesson, we will discuss some methods for distinguishing individual users on a shared device. Additionally, we will review some current offerings for each method that organizations can use to accomplish this.

Preventing Information Leakage from Mobile Devices

10. Preventing Information Leakage from Mobile Devices

Mobile devices are subject to information leaks. In this lesson, you'll learn more about how these information leaks can occur and strategies you can implement for preventing these events from happening.

Protecting the Location of a Mobile Device

11. Protecting the Location of a Mobile Device

Mobile devices can be tracked using a variety of methods, but can also be blocked using some countermeasures. In this lesson, you'll learn more about these tracking efforts and ways to block them.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support