We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Information security in wireless local area networks - Essay Example

Comments (0) Cite this document
Summary
Information Security in Wireless Local Area Networks Faculty Name Your Name Subject Name/ Code Date Abstract Rapid growth of wireless communication has become a common in the enterprises. Now wireless local area networks (WLANs) applications are installed easier than earlier applications…
Download full paperFile format: .doc, available for editing
Polish This Essay97% of users find it useful
Information security in wireless local area networks
Read TextPreview

Extract of sample
"Information security in wireless local area networks"

Download file to see previous pages Man in the Middle (MitM) is a real information security concern for the Wireless Local Area Networks. In the MitM attack, address of the proxy server changes with any fake address and hacks the wireless network in the form of traffic tunnelling, proxy attack, DNS poisoning, and rout mangling. This paper also outlined the solution of the major information security issues through the development of the techniques and protocols. Alloy model is the core focus in this paper, which contains the written code. Execution of this code is verified whether it met the expected function. Development of these techniques and protocols is aimed to ensure the data integrity and security. C# is the core programming language for the client side and PHP programming is used for the server side. Model checking involved the testing of the written features of the application in terms of verification of the descriptions. Static analysis, deductive verification, dynamic analysis and software model checking are the best examples of technology, which use the theorem proving for the validity of verification. Information Security in Wireless Local Area Networks Summary and Conclusion Introductory chapter of thesis narrates the aims and objectives of the work, and describes the structure of the thesis. This early chapter is focused on the Wireless Local Area Networks (WLAN), which is the biggest segment in the Wireless products’ market. Wireless Local Area Networks facilitates the communication and computing in spatial domains including the enterprises, hospitals, offices and campuses. In these environments, WLAN expands and complements the coverage in the existing networks. There are three main objectives behind the information security for the wireless networks such as the data integrity, confidentiality, and availability. Data Integrity; It is ensured that no data or information has been modified. Confidentiality; It is ensured that nobody other than receiver can see or read the information. Availability; It ensures the availability of information needed at any time. The second chapter of this thesis work has been on the history and background of the study. This chapter describes the ways of the wireless detection using when data packets pass through the Network Interface Card (NIC). Managed and “rfmon” modes of data transferring through NIC are stated. The function of the Kismet has been specified when data packets pass through the NIC and saved in the file named as “pcap”. Beacon frame is most wanted for the sniffer that contains the information about sniffing operation. Data sending and receiving over the WLANs need the connection with Access Points. The requirements of the encryption protocol for the data encryption of the beacon frame are also realized in this part of the thesis. A hacker attacks the wireless network and selects a wireless channel from where it attacks the network. Hacker uses the two probing techniques such as active and passive. NetStumbler tools works as active probing and receives the Service Set Identifies (SSID) and host information. An active probe detects the access points in scope of hackers’ transmission. Passive Probing technique is used to drop the data packets over a channel and neither data receiver nor the data sender can detect the attacker’s presence. Surveillance is a passive technique that a hacker uses to capture the data traffic over a ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information security in wireless local area networks Essay”, n.d.)
Information security in wireless local area networks Essay. Retrieved from https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area
(Information Security in Wireless Local Area Networks Essay)
Information Security in Wireless Local Area Networks Essay. https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area.
“Information Security in Wireless Local Area Networks Essay”, n.d. https://studentshare.org/information-technology/1467764-information-security-in-wireless-local-area.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Advances in Wireless Networks
Seeing the growing importance of computer networks in today’s modern world, the management of University of Iland (UoI) has decided to implement a new and more sophisticated network technology structure to better manage university tasks and operations. The basic purpose of this report is to offer a detailed analysis of new wireless network technology implementation at University of Iland (UoI).
10 Pages(2500 words)Essay
Wireless Security
The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides.
15 Pages(3750 words)Essay
Wireless Security Essay
Mobile phones too, they help you to send Multi-Media Messages to other people with cell phones or individual email addresses. You can also use General Packet Radio Service that is probably provided by your mobile phone network's operator to access to the internet.
9 Pages(2250 words)Essay
Wireless Networks
Wireless networks have many uses. A common use is the creation of a portable office. People often want to use their portable electronic equipment to send and receive telephone calls, faxes, and electronic mails, and access remote files and so on from anywhere on land, sea or air.
5 Pages(1250 words)Essay
Wireless Networks-WLAN's
As the name suggests, wireless networking is different from wired networking wherein the use of wires for the purpose of communication is totally eliminated. Under this approach, the various computers and other devices communicate with one another by using radio and microwaves
23 Pages(5750 words)Essay
Local Area Network
(WordNet, n.d.) Computers in the network are also considered as "nodes". There must be a medium that connects these computers and the medium can be either wired or wireless. Other equipment that are necessary include routers or hubs. In a LAN only one machine act as domain server which allows other client machine to log in onto the network in order to share resources, both software and hardware.
3 Pages(750 words)Essay
Wireless Security Best Practices Guide for Business
Keeping this in mind every organization is in search of a good security policy to be jotted down which when followed keeps the company in safe hands. This paper is all about the security policy which
6 Pages(1500 words)Essay
Security in Short Range Wireless Networks
Some of these technologies include WI-FI, Bluetooth, Near Field Communication (NFC), among others. Despite the fact this technologies facilitate sharing of resources and services; they are faced with security challenges. The security challenges faced by these
10 Pages(2500 words)Thesis
Virtual Local Area Networks
ocal Area Networks which allow the network administrators to logically group network nodes and partition their networks without the need for major infrastructure changes. This essay seeks to cover Virtual Local Area Networks (VLANs), focusing on their concept and operation of
8 Pages(2000 words)Essay
Wireless security beyond 802.1x
For a long time, 802.11 wireless security has been safeguarded with the use of 802.1x. However, there are several research technologies that have been developed to enhance 802.11 wireless security (Gao, Zheng & Lu, 2015). The technologies include
2 Pages(500 words)Essay
Let us find you another Essay on topic Information security in wireless local area networks for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us