Geo-fencing Technologies and Security

by William Jason Haddock
Oct. 2, 2017 1 comment Infosecwriters Management

The author explains geo-fencing and how it works and its applications in the real world, including how they pertain to information security and also elaborates the strengths, weaknesses, opportunities, and threats associated. The author includes more information about implementing a geo-fence within a wireless network and the methodology used to contain, fingerprint, and allow mobility of secure data across a network. Geo-fencing is shaping our world and information security professionals need to develop strategies for it in regard to information assurance.

Irina Alexandra Negrii 7 months, 1 week ago

Many geo-fencing applications incorporate Google Earth, allowing administrators to define boundaries on top of a satellite view of a specific geographical area