Facebook Twitter Linkedin
HOME btn ABOUT US btn JOURNALS btn AUTHORS btn CONFERENCE PROCEEDINGS btn SEARCH btn CONTACT US  
  home bred bred bred bred bred bred bred  
   LIST OF ACADEMIA JOURNALS
btn Academia Journal of Biotechnology
btn Journal of Business and Economic     Management
btn  Academia Journal of Medicinal Plants
btn Academia Journal of Environmental     Sciences
btn Academia Journal of Agricultural     Research
btn Academia Journal of Educational     Research
btn Academia Journal of Food Research
btn Academia Journal of Scientific     Research
btn Academia Journal of Microbiology    Research
btn  Engineering and Technology
btn Academia Journal of Pharmacy and     Pharmacology
btn Medicine and Medical Sciences
   USEFUL LINKS
btn Conference Publishing
btn Grants Application
btn  Impact Factor
btn Conference Partners and Sponsors
btn Partners and Indexing Bodies
btn Building New Future Journals. Start a     new journal with Academia Publishing.     Write and submit your proposal
btn Indexed by CABI

Classifications

  1. Eng Technol Res

Google Scholar

 

Related Articles

  1. Google Scholar

  2. PubMed


et

Research Article

Engineering and Technology Research 5(1): 001-012, January 2022
DOI: 10.15413/etr.2020.108
ISSN: 2682 5716
2021 Academia Publishing

Abstract

 

Managing security risks in wireless web services
 

Accepted 11th November, 2021

 

Alaa AL Saeed

Management Information Systems, Bowie State University, United States.

E-mail: alaa.adnan1990@hotmail.com.
 

Over the last twenty years, the Internet has become highly interactive and is not merely a static repository of websites, which allows its users to interact proactively. The functions and tasks of the Internet have evolved during this twenty-year period, such that it is no longer a rudimentary collection of websites. The Internet empowers individual users to explore it in an exponentially greater capacity than in years past. In this study, we will consider the issues of security and trust in IoT and local cloud interfaces. Additionally, the security, requirements of M2M services and security solutions for the internet are analyzed, and their ineffectiveness is discussed.
.

Key words: Internet, computers, M2M services, cloud interfaces, WLAN, WEP, system, wireless networks, management, MAC address.

Cite this article as:
Saeed AA (2022). Managing security risks in wireless web services. Eng. Technol. Res. 5(1): 001-012.


This is an open access article published under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.




Copyright 2022 Academia Publishing. All rights reserved