About This Chapter
Wireless & Mobile Network Security - Chapter Summary
Check out this convenient online computer science chapter to learn essential concepts pertaining to the security of wireless and mobile networks. The chapter consists of short and engaging lessons that outline network risks and security threats, as well as methods for securing these types of networks and protecting information. When you're finished with a lesson, take the accompanying self-assessment quiz to reinforce key terms. You'll be able to access these resources online at any time of day or night, and our subject-matter experts will be happy to answer any questions you may have. By the end of the chapter, you should be able to:
- Compare types of network security attacks and mobile device security threats
- Identify a variety of wireless security issues and solutions
- Recognize measures for securing wireless networks and mobile devices
- Evaluate risks associated with the loss of mobile devices
- Manage mobile device security
- Compare types of authentication methods for mobile devices
- Differentiate between user access levels for mobile devices
- Prevent mobile device information leakage and protect mobile device locations
1. Types of Attacks in Network Security
Network security specialists must face a wide variety of threats to their data and devices. In this lesson, we'll look at a number of the different types of attacks that can occur.
2. Wireless Network Security Issues & Solutions
Anything being broadcasted, such as data over a wireless network, can potentially be intercepted. In this lesson, we'll examine security for wireless networks and how data can be protected from theft and malicious use.
3. How to Secure a Wireless Network: Best Practices & Measures
Keeping your information safe starts with keeping a safe wireless network. In this lesson, we look at the best measures to keep WiFi networks secure, from simply encrypting data to restricting device access.
4. Mobile Device Security Threats, Risks & Issues
The rise of mobile devices has led to a whole new set of threats, risks, and issues. In this lesson, we're going to examine how organizations and individuals seek to keep their mobile devices secure and protect the data on them.
5. Securing Mobile Devices: Types & Identification
Odds are you probably own and use a smartphone, laptop, or other mobile device on a daily basis. In this lesson, we will discuss what mobile devices are and some of the ways to secure them from attacks. We will also briefly review some of the major ways in which mobile devices have affected the modern work environment.
6. Loss of Mobile Devices: Risks & Remediation
In this lesson, learn about the risks of losing a phone or any mobile device that holds personal information or organizational information. Explore some preventive measures that can be implemented and also some actions that should be taken in the event of loss or theft.
7. Mobile Device Security Best Practices & Management
With the number of devices that are connected to your data on the rise, it is essential to be aware of the best practices to keep them secure as well as to protect your data.
8. Authentication for Mobile Devices: Types & Effectiveness
Mobile devices are a very dominant force in the world of technology, and we need to be able to secure them from harm's way properly. This lesson will go over the different types of mobile authentication methods and their uses.
9. Differentiating User Access for Mobile Devices
In this lesson, we will discuss some methods for distinguishing individual users on a shared device. Additionally, we will review some current offerings for each method that organizations can use to accomplish this.
10. Preventing Information Leakage from Mobile Devices
Mobile devices are subject to information leaks. In this lesson, you'll learn more about how these information leaks can occur and strategies you can implement for preventing these events from happening.
11. Protecting the Location of a Mobile Device
Mobile devices can be tracked using a variety of methods, but can also be blocked using some countermeasures. In this lesson, you'll learn more about these tracking efforts and ways to block them.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 323: Wireless & Mobile Networking course