Trong ngày và tuổi tác, gần như tất cả các tờ báo lớn, hoặc mạng lưới phát thanh truyền hình, và trong mọi Thông tin Công nghệ theo định hướng tin tức thông báo và tạp chí, có những tiêu đề về bảo mật máy tính đột nhập và các lỗ hổng hệ thống. Đây là những cung cấp ổ đĩa phía sau phát động an ninh thông tin, hoặc InfoSec vì nó thường được gọi, các chương trình. | 11 Wireless Information Security W-INFOSEC We have touched on Wireless Security throughout this book. In this chapter it is my desire to go deeper into the subject of Information Security in general as well as its impact on Wireless Technologies. Introduction In this day and age almost every major newspaper or network news broadcast and in every Information Technology-oriented news bulletin and magazine there are headlines about computer security break-ins and system vulnerabilities. These are providing the drive behind launching information security or InfoSec as it is most often referred to programs. Times have changed and Information Security programs now need to confront much more than basic security subjects. Many experts believe that it is important to develop a security program within the context of the company s business objectives and culture in order to better understand where the risk comes from and why. Therefore an InfoSec program needs to uncover and respond to the business risks present in the organization. This process begins by critically assessing aspects of the practices and procedures from the standpoint of security. This can reveal unalterable aspects of the corporate culture initiatives with a higher priority than security staff and operational limitations retention and recruitment difficulties budget constraints etc. Since its inception Information Security has been somewhat of a dark horse in Computer Science. The past few decades have seen a global drive to realizing Wireless Data Technologies. Vern A. Dubendorf 2003 John Wiley Sons Ltd ISBN 0-470-84949-5 188 WIRELESS INFORMATION SECURITY W-INFOSEC the potential of the information revolution in a desire to make a positive change on the world. Now that we are deep inside the information age we are now faced with addressing the negative manifestations of these advancements in an environment that was designed to be open - not protected. As has often occurred in the past attention to .