Threats to Wireless Technologies and Mobile Devices and Company Network Safety

  • Teresa Mendyk-Krajewska
  • Zygmunt Mazur
  • Hanna Mazur
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 118)

Abstract

The wireless technologies have become so attractive that more and more networks, including company ones, are created according to these standards. Mobile access to network resources is also becoming more and more common. Unfortunately, security mechanisms which are used nowadays show a number of faults and are prone to attacks, which, in the age of growing threats, including threats to mobile devices, raises concern about the future of wireless realizations. It is particularly significant in the case of industrial networks due to their frequent strategic importance. Management personnel should be aware of real threats whereas employees should strictly obey company safety policy principles assumed. The aim of this article is to show the importance of the problem and a scale of this phenomenon.

Keywords

Mobile Phone Mobile Device Network Resource Wireless Technology Company Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kingsley-Hughes, A.: Wi-Fi Alliance to dump WEP and TKIP, not soon enough (2010), http://www.zdnet.com/blog/hardware/wi-fi-alliance-to-dump-wep-and-tkip-not-soon-enough/8677?tag=nl.e539
  2. 2.
    Vijayan, J.: Researchers use PC to crack encryption for next-gen GSM networks (2010), http://www.computerworld.com/s/article/9144898/Researchers_use_PC_to_crack_encryption_for_next_gen_GSM_networks
  3. 3.
    Flosi, S.L.: comScore Reports (January 2011), U.S. Mobile Subscriber Market Share, http://www.comscore.com/Press_Events/Press_Releases/2011/3comScore_Reports_January_2011_U.S._Mobile_Subscriber_Market_Share
  4. 4.
    Muller, T., Neymayr, T.: Apple Introduces iCloud. Free Cloud Services Beyond Anything Offered to Date (2011), http://www.apple.com/pr/library/2011/06/06Apple-Introduces-iCloud.html
  5. 5.
    Nickinson, P.: A half-million Android devices activated every day, Andy Rubin says (2011), http://www.androidcentral.com/half-million-android-devices-activated-every-day-andy-rubin-says
  6. 6.
    Zorz, Z.: Multiplatform Java botnet spotted in the wild (2011), http://www.net-security.org/malware_news.php?id=1714
  7. 7.
    Maslennikov, D.: Mobile Malware Evolution: An Overview, Part 4 (2011), http://www.securelist.com/en/analysis/204792168
  8. 8.
    Nagy, A.D.: jSMSHider Android Malware Attacks Devices With Custom ROMs (2011), http://pocketnow.com/android/jsmshider-android-malware-attacks-devices-with-custom-roms
  9. 9.
    Dunham, K.: Mobile Malware Attacks and Defense. Syngress Publishing Inc. (2009)Google Scholar
  10. 10.
  11. 11.
  12. 12.
    Namiestnikow, J.: Ewolucja zagrozen IT w I kwartale, roku (2011), http://www.viruslist.pl/news.html?newsid=663
  13. 13.
    BBC News: New iPhone worm can act like botnet say experts, http://news.bbc.co.uk/2/hi/technology/8373739.stm
  14. 14.
    PandaLabs: New Malware Jumps to 73,000 Samples Every Day, Says PandaLabs, http://www.securityweek.com/new-malware-jumps-73000-samples-every-day-says-pandalabs
  15. 15.
  16. 16.
    McAfee: Mobility and Security. Dazzling Opportunities, Profound Challenges, http://www.mcafee.com/mobilesecurityreport
  17. 17.
    Mick, J.: Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin, http://www.dailytech.com/Reports+Hackers+Use+Stolen+RSA+Information+to+Hack+Lockheed+Martin/article21757.htm
  18. 18.

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Teresa Mendyk-Krajewska
    • 1
  • Zygmunt Mazur
    • 1
  • Hanna Mazur
    • 1
  1. 1.Institute of InformaticsWroclaw University of TechnologyWroclawPoland

Personalised recommendations