Monday, January 26, 2009

Wireless and Mobile Security/Keselamatan Tanpa Wayar dan Mudahalih

Subject Name

Wireless and Mobile Security

Subject Code

IWD 2243

Status

Teras Major

Level

Diploma

Credit hours

3 hours

Pre Requisite

IWD2323- Computer Security

Assessment

Final examination – 40%

Mid-semester test – 20%,

Course Work- 40%

Semester Thought

Year 2, Semester 2

Synopsis

The use of wireless networks and mobile communications has become a major trend these days.  Wireless and mobile communications offer many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices without the need for wires and without losing network connectivity.  Mobile and wireless security is therefore of high priority. Security measures taken depend on the different protocols, standards, techniques and systems available. A brief introduction to security protocols, standards and corresponding technologies is given in this subject particularly on 2G, 2.5G, 3G and wireless local area networks. Standards, like WAP, IEEE 802.11 and Bluetooth are included as well as the awareness of the vulnerabilities, threats and countermeasures associated with these wireless technologies

Learning Objective

Aim

In this course, student should be able to gain a solid understanding of the security weaknesses of and threats to wireless LANs ,  understand wireless network design and deployment ,  implement the best security techniques currently available ,  introduce the latest security software and protocols for wireless LANs ,  introduce the best resources for wireless security issues and decisions to the organization

Course learning Outcomes

Upon successful completion of the course, the students should be able to:

  1. Have a clear understanding of the full range of wireless technologies in common use and how to implement them safely.
  2. Understand how to secure wireless systems and prevent threats posed by hackers.
  3. Understand how wireless devices, components and protocols work, how to determine the best wireless solutions for their environments, and how to implement, secure and maintain these solutions.

No comments:

LinkWithin

Related Posts with Thumbnails