Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty of Commerce - Papers (Archive)

2006

Assessments

Articles 1 - 3 of 3

Full-Text Articles in Business

Organisational Factors And Australian Ict Professionals' Views Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett Jan 2006

Organisational Factors And Australian Ict Professionals' Views Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett

Faculty of Commerce - Papers (Archive)

No abstract provided.


Organisational Factors And It Professionals' View Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett Jan 2006

Organisational Factors And It Professionals' View Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett

Faculty of Commerce - Papers (Archive)

The paper reports on a survey-based study of Australian computer security professionals' use of and opinions about two types of wireless vulnerability assessment (WNV A): wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked, and the lack of clear obstacles to using them.

In the light of aspects of organisational culture, including decision-making style and professional identity, the survey findings become more explicable. Senior management, and even IT staff themselves, may still hold a traditional, 'wired network' view of their organisation. 'Culture' may …


Taking Care Of (E)-Business? Australian It Professionals' Views Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett Jan 2006

Taking Care Of (E)-Business? Australian It Professionals' Views Of Wireless Network Vulnerability Assessments, Keir Dyce, Mary Barrett

Faculty of Commerce - Papers (Archive)

M-commerce, a growing sub-category of E-business, allows business to be done 'anywhere, anytime'. However security of wireless devices remains problematic. It is unclear whether protocols to alleviate security problems, such as wireless vulnerability assessments (WNVAs), are being used or are effective. The paper reports on a survey-based study of Australian computer security professionals' use of and opinions about two types of WNVA: wireless monitoring and penetration testing. An initially surprising finding was how little both types are used, despite the ease with which wireless networks can be attacked and the fact that penetration testing is fairly well understood. In the …