{"title":"教育机构实施WPA2-enterprise的效果","authors":"Konstantin Yanson","doi":"10.1109/ICAICT.2016.7991701","DOIUrl":null,"url":null,"abstract":"This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.","PeriodicalId":446472,"journal":{"name":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Results of implementing WPA2-enterprise in educational institution\",\"authors\":\"Konstantin Yanson\",\"doi\":\"10.1109/ICAICT.2016.7991701\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.\",\"PeriodicalId\":446472,\"journal\":{\"name\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2016.7991701\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2016.7991701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Results of implementing WPA2-enterprise in educational institution
This article devoted to practical results of implementing wireless access to an educational network for students end employees in the SPO department of the ITMO University during 4 educational years. Experimental result shows how users deal with security whilst using their BYOD. Security and simplicity are two desirable but incompatible features that need to be balanced. Paper can help to find trade-off between security and convenience when we implement WPA2-Enterprise authentication. Results show what happens when we put security on users and at the same time cutback IT supplying.