The Impact of Emerging Wireless Network System and Cybersecurity in A Global Community
DOI:
https://doi.org/10.14738/tnc.85.9628Keywords:
Wireless Network System, Cybersecurity, Global Community, Cyber-attacks, Fusion centers, Collaborative.Abstract
Wireless network systems and cybersecurity threats are growing faster than their mitigation measures. World Economic Forum has identified wireless network security and cybersecurity threats as its top global risks for the past eight years. This paper aims to critically examine the impact of emerging wireless network systems and cybersecurity in a global community and suggest some best countermeasures against wireless and cybersecurity threats that have been of global concern. To achieve this, the study conducted an in-depth review of wireless network security and cybersecurity. This study has presented a robust wireless security mechanism and suggests appropriate countermeasure against wireless network and cybersecurity threats that is more cost-effective in mounting attacks in the service area, and simultaneously providing higher security than basic security mechanisms.
References
(2) Watts, M. (2007). Revolutionary Islam-Violent geographies, New York: Routledge. 175-204.
(3) Popescu, G. (2016). Borders in the era of globalization. Border Crossings: A Bedford Spotlight Reader. New York: Bedford/St. Martins, 273- 293.
(4) Department of Homeland Security. (2003). A national strategy to secure cyberspace. Retrieved on 9/25/2015 from www.dhs.gov.
(5) Sauter, M. A. & Carafano, J. J. (2005). Homeland Security: A complete guide to understanding, preventing, and surviving terrorism. New York: McGraw-Hill Companies Inc.
(6) Office of Justice Programs. (2013). Fusion center guidelines. Retrieved on 5/28/2013 from http://www.it.ojp.gov/fusioncenterguidelines/intro.html.
(7) Department of Homeland Security. (2013). Fusion Centers Guidelines: Developing and sharing information and intelligence in a new era... Retrieved on 5/29/2016 from
http://www.it.ojp.gov/fusioncenterguidelines/intro.html
(8) Office of Justice Program. (2003). The National Criminal Intelligence Sharing Plan: Solutions and approaches for a cohesive plan to improve our nation’s ability to develop and share criminal intelligence. Retrieved 24/04/2016 from http://www.fas.org/irp/agency.
(9) Petersen, C. R. P. (2003). Community collaboration. Retrieved 12/12/2015 from
http://www.communitycollaboration.net.
(10) Tse, D., and Viswanath, P. (2005). Fundamentals of Wireless Communication. New York, Cambridge University Press.
(11) Theodore S. R. (2002). Wireless Communications - Principles and Practice. Prentice-Hall PTR, 2nd edition.
(12) Raychaudhuri, Dipankar, and Mandayam, Narayan (2011). “Frontiers of Wireless and
Mobile Communications.” Proceedings of IEE, Vol 100, No 4 (824-840).
(13) Fagin, J.A. (2006). When Terrorism strikes at home: Defending the United States. Boston: Pearson Education, Inc.
(14) Lun, D. S., Koetter, M., Koetter, R. and Effros, M. (2008) “On coding for reliable communication over packet networks”. Phys. Commun., vol. 1, no. 1, (3–20).
(15) Frenkiel, R. Badrinath, B., Borres, J and R. Yates, R. (2000) “The infestations Challenge: Balancing cost and ubiquity in delivering wireless data”. IEEE Pers. Commun., vol. 7, no. 2, (66–71)
(16) Meguerdichian, S, Koushanfar, F., M. Potkonjak, and M. Srivastava, M. (2001). “Coverage problems in wireless ad-hoc sensor networks.” 20th Annual Joint Conference. IEEE Computer Commun. Soc. vol. 3, (1380–1387).
(17) Oz, E. (2009). Management Information Systems. Boston: Course Technology, Massachusetts.
(18) Stair, R. M. & Reynolds, G. W. (2014). Fundamentals of Information Systems. Boston: MA, Cengage Learning Course Technology.
(19) Pierre, T. (2001). Building Secure Wireless Local Area Networks. White Papers at Colubris.com http://download.colubris.com/library/whitepapers/WP-010712-EN-01-00.pdf, Retrieved 13/11/2015.
(20) Paul, S., Yates, R., Raychaudhuri, D. and Kurose, J. (2008) “The cache-and-forward network architecture for efficient mobile content delivery services in the future internet.”
(21) Mansfield, Kenneth C, and Antonakos, James L. (2010). Computer Networking from LANs to WANs: Hardware, Software, and Security. Boston: MA, Cengage Learning Course Technology.
(22) Esin, J. O. (2011). The Evolution of Instructional Technology. Journal of Educational Media & Library Sciences (JEMLS), Bloomington, Vol. 29 No. 1: 15-21.
(23) Shelly, G. B., Gunter, G. A., and Gunter, R. E. (2012).Teachers Discovering Computers Integrating Technology in a Connected World. Boston: MA, Cengage Learning Course Technology.
(24) Gupta, S., Islam, S., Nurronnabi, K., Hossain, M. S., and Hasan, Z. (2012). Design & Implementation of Cost Effective Wireless Power Transmission Model: Good-Bye Wires. International Journal of Scientific and Research Publications, Vol. 2, Issues 12.
(25) Bolton, M.K. (2008). US National Security and foreign policy after 9/11: Present at the re-Creation. New York: Rowman & Littlefield Publishers, Inc.
(26) Stair, Ralph M & Reynolds, George W. (2016). Principles of Information Systems. Boston: MA, Cengage Learning Course Technology.
(27) Ivan M., Glen Z., Joe S., and Hao G. (2008). Design, Implementation, and Performance
Analysis of DiscoSec – Service Pack for Securing WLANs. The University of Kaiserslautern, Germany.
(28) LAN MAN Standards Committee of the IEEE Computer Society (2004). Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6:
Medium Access Control (MAC) Security Enhancements. Technical Report 2004 Edition,
IEEE Std 802.11i.
(29) Kessler, G. C. (2013) 35 “Paradigms for Cybersecurity Education in a Homeland Security Program.” Journal of Homeland Security Education, Washington, D.C, Vol. 2 no 35.
(30) Kamien, D. (2005). The McGraw-Hill homeland security handbook: The definitive guide for law enforcement, EMT, and other security professionals. New York: McGraw Hill Publishers, Inc.
(31) David, C., and Cliff, P. (2002). A Path Loss Comparison Between the 5 GHz UNII Band
(802.11a) and the 2.4 GHz ISM Band (802.11b). Technical report, Intel Corporation
England.
(32) Jorgen, B., Clement D., and Joshua H.(1995). Propagation Measurements and Models For Wireless Communications Channels. IEEE Communication Magazine, 33(1):42-49.
(33) Wu, C. J., and Irwin, J. D. (2013). Introduction to Computer Networks and Cybersecurity. Boca Raton: CRC Press.
(34) Singer, P. W., and Friedman, A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.
(35) Moore, R. (2005) "Cybercrime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.
(36) Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392.
(37) Halder, D., & Jaishankar, K. (2011) Cybercrime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global.