Geo-fencing Technologies and Security

Contributed by William Jason Haddock

The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more information about implementing a geo-fence within a wireless network and the methodology used to contain, fingerprint, and allow mobility of secure data across a network. Geo-fencing is shaping our world and information security professionals need to develop strategies for it in regard to information assurance.

This document is in PDF format. To view it click here.

Rate this article: 
No votes yet