skip to main content
research-article
Free Access

Wireless insecurity: examining user security behavior on public networks

Published:01 February 2010Publication History
First page image

References

  1. Berghel, H. and Hoelzer, D. Pernicious Ports. Comm. ACM 48, 12 (Dec. 2005), 23--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. CA Security Advisor; http://www3.ca.com/securityadvisorGoogle ScholarGoogle Scholar
  3. Chenoweth, T., Minch, R. and Tabor, S. User security behavior on wireless networks: An empirical study. In Proceedings of the 40th Annual Hawaii International Conference on System Sciences (IEEE Computer Society, Jan. 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Duffy, J. Wi-Fi hot spots multiply around the world. Network World; http://www.networkworld.com/news/2006/110206-hotspots.html.Google ScholarGoogle Scholar
  5. Housley, R., Arbaugh, W. Security Problems In 802.11-Based Networks. Comm. ACM 46, 5, (May 2003), 31--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Lee, A.J., Koenig, G.A., Meng, X and Yurcik, W. Searching for open windows and unlocked doors: Port scanning in large-scale commodity clusters. IEEE International Symposium on Cluster Computing and the Grid, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. PANDA Software International. Security in wireless networks; http://vocuspr.vocus.com/VocusPR30/Temp/Sites/2631/28d2f2c9bfeb4c808531a849e150d810/WP%20Wifi.pdfGoogle ScholarGoogle Scholar
  8. Poole, C. Wireless information security. In Information Technology Security, Advice from Experts, Lawrence Oliva, Ed. CyberTech Publishing, London, 2004, 110--143.Google ScholarGoogle Scholar
  9. Potter, B. Wireless hotspots: Petri dish of wireless security. Comm. ACM 49, 6, (June 2006), 51--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Schmidt, T. and Townsend, A. Why Wi-Fi wants to be free. Comm. ACM 46, 5, (May 2003), 47--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yu, J., Liu, C., and Ku, C. Wireless trust: conceptual and operational definition. International Journal of Mobile Communication 2, 1, (2004), 38--49 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Wireless insecurity: examining user security behavior on public networks

        Recommendations

        Reviews

        Hua-Yi Lin

        This study reveals that malicious software is widespread, and most users ignore the potential risks of using wireless networks for business transactions. Since wireless communication is exposed to an open environment, many wireless hacking tools can easily sniff the transmitted data and crack the encrypted passwords. The most effective way to avoid such risks is to strengthen the security policy and reinforce the staff's commitment to following the policy. Additionally, organizations need to measure and audit the vulnerability of the network. In general, this article presents some common insecure user behavior. The authors provide statistical data for systems with firewalls, detectable open ports, and other well-known vulnerabilities. Clear solutions for safe wireless network use are provided. Therefore, I recommend it. Online Computing Reviews Service

        Access critical reviews of Computing literature here

        Become a reviewer for Computing Reviews.

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 53, Issue 2
          February 2010
          147 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/1646353
          Issue’s Table of Contents

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 February 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format