Risk Management on Wireless Technology

Risk Management on Wireless Technology

Name:

Institution:

Risk Management on Wireless Technology

Introduction

Wireless technology involves the transfer of information between different points that are unconnected, without the use of a physical conductor. It is a fast growing innovation in the world today. States and corporations have embraced this type of technology to increase efficiency and effectiveness in different processes. This innovation, which is an improvement of earlier technology, has foreseen improvement especially in the field of telecommunications. Wireless technology has highly contributed to increasing international relations and as such giving meaning to the phrase, the world is a global village. This form of innovations has however brought with it both advantages as discussed, and disadvantages.

Literature Review

This project seeks to appreciate the benefits of Wireless technology; while at the same time highlight, what risks are associated with the use of this innovation. It further seeks to find alternatives to minimizing the negative effects of wireless technology.

Hypothesis

            The risks associated with this innovation include insecurity and privacy breach as ones privacy can easily be hacked into by tracing the relevant radioactive waves. Wireless technology due to transmission by radioactive waves, can also easily be disrupted due to the obstruction by large objects. As such, it is highly susceptible to interferences. In addition, wireless networks only cover a short range as compared to wired networks and this may limit their effectiveness. Where several wireless technological plants exist, they are also likely to affect each other’s effectiveness. Corrections in such defects caused by this type of technology include creating backups of documents operated on wireless networks and enhancing security measures related to the technology to ensure safety to its users. In addition, wireless networks should be monitored constantly to detect new threats and vulnerabilities that may affect the effectiveness of this technology.

Research Methodology

            Information on the merits and demerits of wireless technology has been gathered from different sources, using different research methods. The first research methodology used in this project is qualitative analysis. The latter involves collecting data in statistical and numerical form, using tools such as questionnaires and surveys. The tools were given to wireless technology users and a service provider to fill and give data on risks and benefits associated with this form of innovation. Findings from this form of assessment were clear and precise and gave clear findings on wireless technology.

            Quantitative analysis was also used, through interviews and focus group discussions to come up with relevant findings for the project. The data gathered was then refined and consolidated to come up with the research project and help give a plan on risk management. Using both methods contributed toward a wholesome research and valid findings.

Conclusion

Protection and maintenance of wireless communication and networks consequently leads to satisfaction from its users whether individuals or corporations. Risk assessment of wireless technologies; help users apply countermeasures to address the specific threats and vulnerabilities. The countermeasures can take the form of management, operational, and technical controls. While these countermeasures may not prevent all malfunctions in operating of the technology, they can be effective in reducing the common risks associated with wireless innovations.

How to place an order?

Take a few steps to place an order on our site:

  • Fill out the form and state the deadline.
  • Calculate the price of your order and pay for it with your credit card.
  • When the order is placed, we select a suitable writer to complete it based on your requirements.
  • Stay in contact with the writer and discuss vital details of research.
  • Download a preview of the research paper. Satisfied with the outcome? Press “Approve.”

Feel secure when using our service

It's important for every customer to feel safe. Thus, at Supreme Assignments, we take care of your security.

Financial security You can safely pay for your order using secure payment systems.
Personal security Any personal information about our customers is private. No other person can get access to it.
Academic security To deliver no-plagiarism samples, we use a specially-designed software to check every finished paper.
Web security This website is protected from illegal breaks. We constantly update our privacy management.

Get assistance with placing your order. Clarify any questions about our services. Contact our support team. They are available 24\7.

Still thinking about where to hire experienced authors and how to boost your grades? Place your order on our website and get help with any paper you need. We’ll meet your expectations.

Order now Get a quote