The origin of wireless communication goes back to 1896, when Marconi invented the wireless telegraphy. Wireless communication is the transfer of information over a distance without the use of electrical conductors or wires. The distance involved May be short short or long e.g GPS units , wireless computer mice, keyboards and headstart, satellite television.
Generations of wireless communication
I G ( The first Generation)
It is a wireless telephone technology and mobile telecommunication introduced in 1980s. I G network use analog signals as opposed to digital signals used by all the successive generations. In this , voice calls were generally modulated to a higher frequency typically 150 MHz and up.
2 G (The Second Generation)
It was commercially launched for the GSM ( Global System for Mobile Communication) standard in 1991bu Radiolinja in Finland . it was allowed for enhanced data service and also introduced short messaging services (SMSs)
3 G ( The Third Generation)
it was introduced by NTT DoCoMo in Japan in 2001. Its data transfer rates are 384 k bit /sec .so, it allows for never before services like video calls , video conferencing , mobile , TV etc
4 G ( The Fourth Generation)
Telia Sonera was the first operator in the world to commercially launch 4G in kate 2009 in the city centre of Stockholm and Oslo and a year later it was launched in Finland .
Bharti Airtel had launched 4 G on mobile in Bangalore thus becoming the first in India to offer such service on 14th February 2014.
5 G ( The fifth Generation)
It will be a successor for 4 G. it is a term used in some research papers and projects to denote the next major phase. Alliance feels that 5G should be rolled out by 2020 to meet business and consumer demands.
Security Threats
A threat is a potential negative action or event aided by a vulnerability that results in an unwanted impact on a computer system or application in the context of computer security is the part of security threat.
Phishing
It is characterized by the attempt to fraudulently acquire sensitive information such as password, credit card details etc. By masquerading as a trustworthy person.
Intruders
The attackers who would constantly find their way for breaking and entering inyo a secured system to access confidential or users information are called intruders.
Virus
It is defined as a programme or a piece of code that gets loaded onto the computer without users knowledge and replicates itself . various kinds of virus are boot sector virus, Macro virus, resident virus etc. E.g. Creeper, stuxnet, conficker, code red, SQL Slammer, Nimda ( derived from the word Admin) etc.
- Creeper is generally accepted to be the first computer virus written ny bob Thomas at BBN ( bolt Beranak and Newman) in 1971.
Worm
It is a self replicating computer programe , similar to a virus. It is self contained programe and doesn’t need to be a part of another programe to propagate itself .
Spam
It is an unsolicited message sent over the internet in the form of E mails to a large number of users for the purpose of spreading malware, advertising phishing etc.
Spyware
It is a type of malicious software installed on computers and collects information about users without their knowledge and May send such information to another entity. It can assets control over the computer without consumer’s knowledge.
Malware
A software which is specifically designed to disrupt or damage a computer viruses, worms, spyware, Trojan horses and other malicious or unwanted software.
Botnet
It is a number of internet computers that have been set up to forward transmission including spam and viruses to the other computers on the internet without the knowledge of their owners. It is also known as Zombie Army.
Antivirus
It is a software consisting of computer programme that attempts to identify , detect and prevent the malware from computer. It is typically uses two different techniques to accomplish this
- Examining files to look for known viruses by means of a viruses dictionary.
- Identifying suspicious behavior from any computer programme which might indicate infection .
e.g. Kaspersky, Norton , AVG , Avast , McAfee etc.