Constructing the Matching Model of Wireless LAN Security Solution in Different Environments
碩士 === 輔仁大學 === 資訊管理學系 === 98 === With the popularity of WLAN, information security has become a hot topic. In order to protect the safety of WLAN, enterprises and individual users take the corresponding security measures. Based on the degree of attention on the safety, security modes are also somew...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/49904448287037231256 |
id |
ndltd-TW-098FJU00396002 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-098FJU003960022016-04-25T04:29:23Z http://ndltd.ncl.edu.tw/handle/49904448287037231256 Constructing the Matching Model of Wireless LAN Security Solution in Different Environments 建構無線區域網路在不同環境之安全方案配對模式 Kuo Yung Yu 郭永裕 碩士 輔仁大學 資訊管理學系 98 With the popularity of WLAN, information security has become a hot topic. In order to protect the safety of WLAN, enterprises and individual users take the corresponding security measures. Based on the degree of attention on the safety, security modes are also somewhat different with protection level. If people employ an inappropriate security mode, then it will increase security risk or unnecessary waste of resources. In the past, there has been little academic research on the relations of security mode and the application environment. Therefore, the purpose of this study was to establish an applicable matching model, provided by such matching relationship to the current and future users for an appropriate security mode selection. This study used a case study method. Firstly, after surveying the related literature for the WLAN security risks when people in use, specifying for the different characteristics of each security solution, the study defined the different application environments for WLAN. Then, a relationship matching model between the security solution and application environment was proposed. In this study, there are three different types of cases which including SOHO, organization, and public area. With the case study of WLAN security solutions at the actual situation usage, the study also demonstrated the effectiveness of the proposed model. The results showed that the actual implementation of these cases and the proposed matching model are quite consistent. Therefore, this study indicated a high degree of effectiveness of matching model. Among the main application environments, the SOHO which containing simple organizations are applicable to the simple program of this study, the complex organizations are applicable to the complex program and the public areas are applicable to the UAM (Universal Access Method) program. Yang Ming Hsien 楊銘賢 2010 學位論文 ; thesis 110 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 輔仁大學 === 資訊管理學系 === 98 === With the popularity of WLAN, information security has become a hot topic. In order to protect the safety of WLAN, enterprises and individual users take the corresponding security measures. Based on the degree of attention on the safety, security modes are also somewhat different with protection level. If people employ an inappropriate security mode, then it will increase security risk or unnecessary waste of resources. In the past, there has been little academic research on the relations of security mode and the application environment. Therefore, the purpose of this study was to establish an applicable matching model, provided by such matching relationship to the current and future users for an appropriate security mode selection.
This study used a case study method. Firstly, after surveying the related literature for the WLAN security risks when people in use, specifying for the different characteristics of each security solution, the study defined the different application environments for WLAN. Then, a relationship matching model between the security solution and application environment was proposed. In this study, there are three different types of cases which including SOHO, organization, and public area. With the case study of WLAN security solutions at the actual situation usage, the study also demonstrated the effectiveness of the proposed model.
The results showed that the actual implementation of these cases and the proposed matching model are quite consistent. Therefore, this study indicated a high degree of effectiveness of matching model. Among the main application environments, the SOHO which containing simple organizations are applicable to the simple program of this study, the complex organizations are applicable to the complex program and the public areas are applicable to the UAM (Universal Access Method) program.
|
author2 |
Yang Ming Hsien |
author_facet |
Yang Ming Hsien Kuo Yung Yu 郭永裕 |
author |
Kuo Yung Yu 郭永裕 |
spellingShingle |
Kuo Yung Yu 郭永裕 Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
author_sort |
Kuo Yung Yu |
title |
Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
title_short |
Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
title_full |
Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
title_fullStr |
Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
title_full_unstemmed |
Constructing the Matching Model of Wireless LAN Security Solution in Different Environments |
title_sort |
constructing the matching model of wireless lan security solution in different environments |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/49904448287037231256 |
work_keys_str_mv |
AT kuoyungyu constructingthematchingmodelofwirelesslansecuritysolutionindifferentenvironments AT guōyǒngyù constructingthematchingmodelofwirelesslansecuritysolutionindifferentenvironments AT kuoyungyu jiàngòuwúxiànqūyùwǎnglùzàibùtónghuánjìngzhīānquánfāngànpèiduìmóshì AT guōyǒngyù jiàngòuwúxiànqūyùwǎnglùzàibùtónghuánjìngzhīānquánfāngànpèiduìmóshì |
_version_ |
1718233986624389120 |