正在加载图片...
/ireless in the enterprise 361 How will the deployment of a wireless system result in efficient and effective How will deployment of wireless infrastructure translate into cost-savings(ROD)for What level of security will the applications running on these wireless systems need? How will the system's integrity be compromised if there is a security breach or if these mobile devices are stolen/lost? In what environment (indoor/outdoor) will the mobile clients be working and when will these systems be used Are the users already familiar with wireless technology? If not, then firms need to train their users with not only how to use but also why they should be using these systems. It has been shown that when users have no incentive to use a system, many great technological implementations of the systems can fail Will data sent be stored/updated in some database in real-time that is further used by other parties for inventorying, accounting and billing purposes, such as in health nsurance industries, or is it just used for messaging/dispatching purposes? How frequently will users need to transmit or access the information? Do the mobile clients need to havealways on internet access? will the users benefit from having always oninternet access? Lastly, how frequently will the users need to charge-up their devices? Although it may seem a minor point, it significantly affects the usage of such devices 3 A secure and dependable wireless solution Although many industries and companies have invested money and efforts towards supporting wireless deployment in their site, there have been many obstacles. These are lack of security, lack of wireless infrastructure dependability and unpredictable levels of coverage and access. The coverage issues are important as businesses have been using wireline networks with substantial coverage and dependability. Security is always an issue as businesses are unlikely to put mission-critical data on networks that are not secure or are 'perceived to be insecure. 3.1 Security issues There are many security issues in the enterprise environment, including confidentiality. authentication, integrity, authorisation, non-repudiation and accessibility. Other issues would include convenience, speed, ease-of-use and standardisation. In addition to security and privacy risks, new vulnerabilities arise due to the use of wireless devices. The use of wireless infrastructure may involve multiple wireless networks with different levels of security. These could lead to possible change/deletion of information and denial of service. In such an environment, tracing of hackers is a very difficult job as devicesWireless in the enterprise 361 • How will the deployment of a wireless system result in efficient and effective operations performed by its mobile clients? • How will deployment of wireless infrastructure translate into cost-savings (ROI) for the organisation? • What level of security will the applications running on these wireless systems need? How will the system’s integrity be compromised if there is a security breach or if these mobile devices are stolen/lost? • In what environment (indoor/outdoor) will the mobile clients be working and when will these systems be used? • Are the users already familiar with wireless technology? If not, then firms need to train their users with not only how to use but also why they should be using these systems. It has been shown that when users have no incentive to use a system, many great technological implementations of the systems can fail. • Will data sent be stored/updated in some database in real-time that is further used by other parties for inventorying, accounting and billing purposes, such as in health insurance industries, or is it just used for messaging/dispatching purposes? • How frequently will users need to transmit or access the information? Do the mobile clients need to have ‘always on’ internet access? Will the users benefit from having ‘always on’ internet access? • Lastly, how frequently will the users need to charge-up their devices? Although it may seem a minor point, it significantly affects the usage of such devices. 3 A secure and dependable wireless solution Although many industries and companies have invested money and efforts towards supporting wireless deployment in their site, there have been many obstacles. These are lack of security, lack of wireless infrastructure dependability and unpredictable levels of coverage and access. The coverage issues are important as businesses have been using wireline networks with substantial coverage and dependability. Security is always an issue as businesses are unlikely to put mission-critical data on networks that are not secure or are ‘perceived’ to be insecure. 3.1 Security issues There are many security issues in the enterprise environment, including confidentiality, authentication, integrity, authorisation, non-repudiation and accessibility. Other issues would include convenience, speed, ease-of-use and standardisation. In addition to security and privacy risks, new vulnerabilities arise due to the use of wireless devices. The use of wireless infrastructure may involve multiple wireless networks with different levels of security. These could lead to possible change/deletion of information and denial of service. In such an environment, tracing of hackers is a very difficult job as devices
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有