Layered Security Approach for Mobile Computing

Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wirele...

Full description

Saved in:
Bibliographic Details
Main Author: Abiodun, Bakare Mustapha
Format: Thesis
Language:en
en
Published: 2011
Subjects:
Online Access:https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf
https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf
https://etd.uum.edu.my/2654/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1833435943167590400
author Abiodun, Bakare Mustapha
author_facet Abiodun, Bakare Mustapha
author_sort Abiodun, Bakare Mustapha
building UUM Library
collection Institutional Repository
content_provider Universiti Utara Malaysia
content_source UUM Electronic Theses
continent Asia
country Malaysia
description Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wireless network against any possible threat from unauthorized users from coming into the network. Five layered security levels was discussed in the literature review as an effective means of securing any wireless network from cyber terrorists attacks. The main objective of this research is to deploy Authentication and Access Control security measures under the Network layer security approach, which happens to be one of the steps involved in securing mobile computing devices using layered security approach. The methodology for the research was adopted from SDLC which include Planning, Analysis, Design, Implementation and Evaluation. Consequently, the findings of the research was hoped to motivate and encourage organizations to incorporate and deploy layered security approach in improving and enhancing their network security against any possible attacks from external mobile users.
format Thesis
id my.uum.etd-2654
institution Universiti Utara Malaysia
language en
en
publishDate 2011
record_format eprints
spelling my.uum.etd-26542022-04-10T23:52:20Z https://etd.uum.edu.my/2654/ Layered Security Approach for Mobile Computing Abiodun, Bakare Mustapha QA71-90 Instruments and machines Mobile technology had been accepted to be a vital and important and advancing application to be made use of in facilitating our way of doing business, because of its mobility nature. This research focus on securing mobile computing devices using layered security approach in order to safeguard wireless network against any possible threat from unauthorized users from coming into the network. Five layered security levels was discussed in the literature review as an effective means of securing any wireless network from cyber terrorists attacks. The main objective of this research is to deploy Authentication and Access Control security measures under the Network layer security approach, which happens to be one of the steps involved in securing mobile computing devices using layered security approach. The methodology for the research was adopted from SDLC which include Planning, Analysis, Design, Implementation and Evaluation. Consequently, the findings of the research was hoped to motivate and encourage organizations to incorporate and deploy layered security approach in improving and enhancing their network security against any possible attacks from external mobile users. 2011 Thesis NonPeerReviewed text en https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf text en https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf Abiodun, Bakare Mustapha (2011) Layered Security Approach for Mobile Computing. Masters thesis, Universiti Utara Malaysia.
spellingShingle QA71-90 Instruments and machines
Abiodun, Bakare Mustapha
Layered Security Approach for Mobile Computing
title Layered Security Approach for Mobile Computing
title_full Layered Security Approach for Mobile Computing
title_fullStr Layered Security Approach for Mobile Computing
title_full_unstemmed Layered Security Approach for Mobile Computing
title_short Layered Security Approach for Mobile Computing
title_sort layered security approach for mobile computing
topic QA71-90 Instruments and machines
url https://etd.uum.edu.my/2654/1/Bakare_Mustapha_Abiodun.pdf
https://etd.uum.edu.my/2654/2/1.Bakare_Mustapha_Abiodun.pdf
https://etd.uum.edu.my/2654/
url_provider http://etd.uum.edu.my/