Study on Wireless Network and Restrictive Approaches to Enhance the Data Security

Many organizations nowadays use wireless networks or Wi-Fi (Wireless Fidelity) networks. This is because of the resilience and flexibility, simplicity in installing, and lower costs when compared to fixing wired cables all over an organization’s infrastructure. The Wi-Fi technology are not only inst...

Full description

Bibliographic Details
Main Authors: Ponkoodalingam, Kannan, Nitashine, Baskaran, Deshinta, Arrova Dewi
Format: Article
Language:English
Published: INTI International University 2018
Subjects:
Online Access:http://eprints.intimal.edu.my/1144/
http://eprints.intimal.edu.my/1144/1/v1_2018_9.pdf
_version_ 1848766658372435968
author Ponkoodalingam, Kannan
Nitashine, Baskaran
Deshinta, Arrova Dewi
author_facet Ponkoodalingam, Kannan
Nitashine, Baskaran
Deshinta, Arrova Dewi
author_sort Ponkoodalingam, Kannan
building INTI Institutional Repository
collection Online Access
description Many organizations nowadays use wireless networks or Wi-Fi (Wireless Fidelity) networks. This is because of the resilience and flexibility, simplicity in installing, and lower costs when compared to fixing wired cables all over an organization’s infrastructure. The Wi-Fi technology are not only installed on private wireless networks, it is installed speedily on the public wireless network via hotspots. For example, hotels, airports, restaurants and more. Wi-Fi is certain type of WLAN (Wireless Local Area Network) whereby the WLAN technology is the quickest growing technology besides the Internet. In response with the growing of the security hazards on WLAN’s data security and unauthorized corporate is what the network administrators and information security managers must give an extra attention to. Hence, the scope of this research focuses on the wireless network security in terms of threats and restrictive approaches whereby multi-factor authentication technology is proposed as one of the ways to mitigate the threats. Five hypothesis are included to support this study and they are analyzed using quantitative and qualitative software i.e. SPSS and QDA Miner. The result shows that multi-factor authentication should be implemented as additional security feature on the wireless network
first_indexed 2025-11-14T11:54:39Z
format Article
id intimal-1144
institution INTI International University
institution_category Local University
language English
last_indexed 2025-11-14T11:54:39Z
publishDate 2018
publisher INTI International University
recordtype eprints
repository_type Digital Repository
spelling intimal-11442021-05-10T08:20:35Z http://eprints.intimal.edu.my/1144/ Study on Wireless Network and Restrictive Approaches to Enhance the Data Security Ponkoodalingam, Kannan Nitashine, Baskaran Deshinta, Arrova Dewi QA75 Electronic computers. Computer science Many organizations nowadays use wireless networks or Wi-Fi (Wireless Fidelity) networks. This is because of the resilience and flexibility, simplicity in installing, and lower costs when compared to fixing wired cables all over an organization’s infrastructure. The Wi-Fi technology are not only installed on private wireless networks, it is installed speedily on the public wireless network via hotspots. For example, hotels, airports, restaurants and more. Wi-Fi is certain type of WLAN (Wireless Local Area Network) whereby the WLAN technology is the quickest growing technology besides the Internet. In response with the growing of the security hazards on WLAN’s data security and unauthorized corporate is what the network administrators and information security managers must give an extra attention to. Hence, the scope of this research focuses on the wireless network security in terms of threats and restrictive approaches whereby multi-factor authentication technology is proposed as one of the ways to mitigate the threats. Five hypothesis are included to support this study and they are analyzed using quantitative and qualitative software i.e. SPSS and QDA Miner. The result shows that multi-factor authentication should be implemented as additional security feature on the wireless network INTI International University 2018-09-01 Article PeerReviewed text en http://eprints.intimal.edu.my/1144/1/v1_2018_9.pdf Ponkoodalingam, Kannan and Nitashine, Baskaran and Deshinta, Arrova Dewi (2018) Study on Wireless Network and Restrictive Approaches to Enhance the Data Security. INTI Journal, 1 (9). pp. 1-7. ISSN e2600-7920
spellingShingle QA75 Electronic computers. Computer science
Ponkoodalingam, Kannan
Nitashine, Baskaran
Deshinta, Arrova Dewi
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title_full Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title_fullStr Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title_full_unstemmed Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title_short Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
title_sort study on wireless network and restrictive approaches to enhance the data security
topic QA75 Electronic computers. Computer science
url http://eprints.intimal.edu.my/1144/
http://eprints.intimal.edu.my/1144/1/v1_2018_9.pdf