Security of Wireless Networks
نویسندگان
چکیده
Wireless networks today have become a normal standard, technology that could not even be imagined few years ago. We them everywhere: at home, in schools, offices, restaurants, airports, squares or main streets. These wireless an inevitable, as well necessary part to carry out our daily tasks, from the simplest most sophisticated ones. Thanks them, we can study, work, buy, order book very short time and feeling comfortable; all sitting on chair with cell phone laptop front connected wirelessly.However, world is somewhat more complex. Things are simple they seem. There many malicious individuals who devised hundreds of ways make these vulnerable. A minimum 800,000 hacked each year according Norton, American antivirus company, but only. Thousands businesses, organizations institutions also fallen prey attacks.In this some types attacks encountered often against dealt with. Some key security measures taken by anyone gain minimal been identified, practical tips for homes, public spaces summarized.The purpose study clearly show danger have, possible threats prevent them. Keywords : network, wireless, security, attack, hacker, privacy DOI: 10.7176/CTI/11-02 Publication date: October 31 st 2022
منابع مشابه
Security in Wireless Networks
The 802.11 specifications include services for link-level authentication and an optional privacy (i.e., confidentiality) service termed Wired Equivalent Privacy (WEP). WEP is designed to protect the confidentiality of link layer traffic (i.e., the wireless leg). The security parts of the standard provide no claims about secure integrity assurance, but it does require a frame check sequence (FCS...
متن کاملSecurity in Heterogeneous Wireless Networks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Control Theory and Informatics
سال: 2022
ISSN: ['2224-5774']
DOI: https://doi.org/10.7176/cti/11-02