{"title":"评估在无线家庭和办公环境中保护机密信息的真实风险","authors":"M. Barbeau","doi":"10.1109/WOWMOM.2010.5534940","DOIUrl":null,"url":null,"abstract":"The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.","PeriodicalId":384628,"journal":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","volume":"45 11","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Assessment of the true risks to the protection of confidential information in the wireless home and office environment\",\"authors\":\"M. Barbeau\",\"doi\":\"10.1109/WOWMOM.2010.5534940\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.\",\"PeriodicalId\":384628,\"journal\":{\"name\":\"2010 IEEE International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"volume\":\"45 11\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Symposium on \\\"A World of Wireless, Mobile and Multimedia Networks\\\" (WoWMoM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WOWMOM.2010.5534940\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WOWMOM.2010.5534940","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Assessment of the true risks to the protection of confidential information in the wireless home and office environment
The ubiquity of wireless communications, in the home and office environment, introduces information security risks specific to WLANs and handheld devices. It is crucial to continuously monitor their evolution but every threat must be examined in terms of potential impact and likelihood. Only when both conditions are present, it does need to be mitigated. This paper shows how the problem can be addressed in a methodological manner. By conducting a proper risk assessment we can identify the threats, to the security of wireless communications, that are real and the ones that are inoffensive. Examples related to the protection of confidential information, in the wireless home and office environment, are used to illustrate the point.