earticle

논문검색

Wireless Network Security: Vulnerabilities, Threats and Countermeasures

초록

영어

Wireless networking provides many advantages, but it also coupled with new security threats and alters the organization’s overall information security risk profile. Although implementation of technological solutions is the usual respond to wireless security threats and vulnerabilities, wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats. We present a framework to help managers understand and assess the various threats associated with the use of wireless technology. We also discuss a number of available solutions for countering those threats.

목차

Abstract
 1. Introduction
 2. Wireless Vulnerabilities, Threats and Countermeasures
  2.1 Wireless Network Attacks
 3. Securing Wireless Transmissions
  3.1 Protecting the Confidentiality of Wireless Transmissions
  3.2 Preventing Alteration of Intercepted Communications
  3.3 Countermeasures to Reduce the Risk of Denial-of-Service Attacks
 4. Securing Wireless Access Points
  4.1 Countermeasures to Secure Wireless Access Points
 5. Securing Wireless Client Devices
 6. Securing Wireless Networks
  6.1 Use of Encryption
  6.2 Use anti-virus and anti-spyware software, and a firewall
  6.3 Turn off identifier broadcasting
  6.4 Change the identifier on your router from the default
  6.5 Change your router’s pre-set password for administration
  6.6 Allow only specific computers to access your wireless network
  6.7 Turn off your wireless network when you know you won’t use it
  6.8 Don’t assume that public “hot spots” are secure
 7. Training and Educating Users
 8. Network Auditing
 9. Conclusion
 References

저자정보

  • Min-kyu Choi School of Multimedia, Hannam University, Daejeon, Korea
  • Rosslin John Robles School of Multimedia, Hannam University, Daejeon, Korea
  • Chang-hwa Hong
  • Tai-hoon Kim Rosslin John Robles

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.