## Abstract Over the past few years, companies have gradually abandoned paper records. They've shifted to electronic communication and records. But now, IT staff and corporate counsel are grappling with a whole new set of rules governing electronic legal evidence. What electronic information must y
The negative effects of e-discovery rules
โ Scribed by Dario Forte
- Publisher
- Elsevier Science
- Year
- 2007
- Tongue
- English
- Weight
- 84 KB
- Volume
- 2007
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
The figure shows that many of the authentication methods, such as those used by Wi-Fi and WiMAX, operate at the lower layers of the network stack, while RADIUS and TLS operate at higher layers, giving a layered approach.
Conclusions
Authentication in wireless networks has improved considerably since the original open authentication mechanism used in early versions of 802.11. The release of 802.11i and, in the future 802.11w, address many of the security and authentication issues found in 802.11. However, organizations will have to invest time and effort into selecting and implementing an EAP framework and associated authentication protocols.
The good news is that many of the tools already deployed, such as RADIUS, VPN and TLS, can assist in authenticating users and devices in the wireless environment. Organizations do not have to re-invent the wheel but can build on existing implementations to provide secure and reliable authentication in the wireless environment. Wireless authentication is not in the air -it is here, it is real and it can be implemented.
๐ SIMILAR VOLUMES