Wireless Technology Security Concept Paper

798 Words2 Pages

Wireless Technology Security Concept Paper
Derek Hees
American Military University
Intrusion Detection and Incident Handling
ISSC 642
Dr. David Andersson
01/31/2016

Wireless Technology Security
Wireless technology is an industry that is growing exponentially. For every new and existing product, there is a want/need and expectation that the product will someday be available to use wirelessly. The only obstacle is the time it takes to advance the technology to become wireless.
This wireless movement has been fueled by the rise and advancement of the cellular phone. Before cellular phones were common in personal and business use, a person had to be in a specific place at the time a call was placed to receive the phone call or message. Cellular phones gave the user to the ability to make and receive calls at any location. The first truly portable cellular phone was sold by Motorola in 1983, costed $3,900, was bulky, and could only place and receive basic phone calls (marwalla, 2010). This was impractical for most consumers and businesses at the time. However, innovation and advances in technology allowed manufacturers to continuously improve all aspects of the cell phone. Cell phones became “smarter”, packing more features into a smaller space and becoming increasingly affordable. The correlating evolution of broadband wireless internet and cellular data network have also attributed to the advancement.
Today, cellular phones have a graphical user interface, touchscreens, high-speed data connections, and applications that help the user achieve almost any task (Smith, 2015). Smartphones are becoming more commonly known as “mobile devices”. This is due to the fact that being a phone is now only a small part of the ...

... middle of paper ...

...: http://www.cnn.com/2010/TECH/mobile/07/09/cooper.cell.phone.inventor/
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond Intrusion Detection. Boston: Addison-Wesley Professional.
Growing Importance of Mobile Devices in Business [Infographic]. (2014, October 10). Retrieved from CPC Strategy: http://www.cpcstrategy.com/blog/2014/10/mobile-devices-infographic/
Ruggiero, P., & Foote, J. (n.d.). Cyber Threats to Mobile Phones. US CERT. Retrieved from https://www.us-cert.gov/sites/default/files/publications/cyber_threats-to_mobile_phones.pdf
Smith, A. (2015, April 1). U.S. Smartphone Use in 2015. Retrieved from Pew Research Center: http://www.pewinternet.org/2015/04/01/us-smartphone-use-in-2015/
The History And Evolution Of Cell Phones. (n.d.). Retrieved from The Art Institutes: https://www.artinstitutes.edu/blog/the-history-and-evolution-of-cell-phones

More about Wireless Technology Security Concept Paper

Open Document