Wireless service at Public University: A survey of users perception on security aspects

Arif Ridho Lubis, F. Fachrizal, M. Lubis, H. M. Tahir
{"title":"Wireless service at Public University: A survey of users perception on security aspects","authors":"Arif Ridho Lubis, F. Fachrizal, M. Lubis, H. M. Tahir","doi":"10.1109/ICOIACT.2018.8350786","DOIUrl":null,"url":null,"abstract":"There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure access to campus network. Not surprisingly, the large majority of enterprises also have implemented some form of protection mechanism to provide end-to-end security such as firewall, authentication or antivirus, which at some extent it is difficult to design, configure, manage, maintain and monitor. Therefore, many security breaches are occurred because of the misconfiguration resulted the vulnerabilities to be exploited by hackers or caused by compatibility issues between products used in the campus network to reduce budget. Arguably, many security aspects can be strengthen through the improvement of human resource strategy to handle the campus network. This study want to investigate the user perception on security aspect of Wi-Fi performance in Universiti Utara Malaysia to provide some insights on the indicators to be considered by the network administrator.","PeriodicalId":6660,"journal":{"name":"2018 International Conference on Information and Communications Technology (ICOIACT)","volume":"9 1","pages":"78-83"},"PeriodicalIF":0.0000,"publicationDate":"2018-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information and Communications Technology (ICOIACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIACT.2018.8350786","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

There is an important growth in the application to detect and protect network from the intrusion and unauthorized party as well as create access control among users around the world through this decade. Contextually, the majority of users expected an integrated platform to address the challenges posed by cyber security while also enabling secure access to campus network. Not surprisingly, the large majority of enterprises also have implemented some form of protection mechanism to provide end-to-end security such as firewall, authentication or antivirus, which at some extent it is difficult to design, configure, manage, maintain and monitor. Therefore, many security breaches are occurred because of the misconfiguration resulted the vulnerabilities to be exploited by hackers or caused by compatibility issues between products used in the campus network to reduce budget. Arguably, many security aspects can be strengthen through the improvement of human resource strategy to handle the campus network. This study want to investigate the user perception on security aspect of Wi-Fi performance in Universiti Utara Malaysia to provide some insights on the indicators to be considered by the network administrator.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
公立大学无线服务:用户对安全方面看法的调查
在这十年中,在检测和保护网络免受入侵和未经授权的一方以及在世界各地的用户之间创建访问控制方面的应用程序有了重要的增长。在这种情况下,大多数用户期望一个集成平台来解决网络安全带来的挑战,同时实现对校园网的安全访问。毫不奇怪,大多数企业还实现了某种形式的保护机制来提供端到端的安全性,例如防火墙、身份验证或防病毒,这些机制在某种程度上难以设计、配置、管理、维护和监控。因此,由于配置不当导致漏洞被黑客利用,或者由于校园网中使用的产品之间存在兼容性问题,以减少预算,导致了许多安全漏洞的发生。可以说,很多安全方面都可以通过完善人力资源战略来加强对校园网的管理。本研究希望调查用户对马来西亚北方大学Wi-Fi性能安全方面的看法,以提供一些关于网络管理员应考虑的指标的见解。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data Normalization and Database Design for Joglosemar Tourism Management of fault tolerance and traffic congestion in cloud data center Development of smart public transportation system in Jakarta city based on integrated IoT platform Improving the quality of enterprise IT goals using COBIT 5 prioritization approach Data mining technique with cluster anaysis use K-means algorithm for LQ45 index on Indonesia stock exchange
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1