Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page49/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   45   46   47   48   49   50   51   52   ...   71
FULLTEXT01
ijsrp-p4303

™ Authentication attacks
Intruders use these attacks to steal legitimate user identities and credentials to access otherwise private networks and services. Dictionary attack and brute force attack are the two most common techniques employ hereby the attackers to achieve their objectives.

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 31 -Once succeeded, the attacker impersonates (masquerading) as an authorized user, thereby gaining certain unauthorized privileges. More on masquerading can be found on section
4.1.1.

Download 470.11 Kb.

Share with your friends:
1   ...   45   46   47   48   49   50   51   52   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page