Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]


Figure 6 Protocol Structure - IEEE i WLAN Security Standards. ......... - 17 -



Download 470.11 Kb.
View original pdf
Page9/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   5   6   7   8   9   10   11   12   ...   71
FULLTEXT01
ijsrp-p4303
Figure 6 Protocol Structure - IEEE i WLAN Security Standards. ......... - 17 -
Figure 7 x Authentication Process (WPA2) .................................................. - 18 -
Figure 8 General Taxonomy of WLAN security attacks ...................................... - 24 -
Figure 9 Security as a process ................................................................................. - 33 -
LIST OF TABLES
Table 1 Comparison of WLAN Transmission Technologies. ................................. - 9 -
Table 2 Showing 900 MHz, 2.4 GHz and 5 GHz ISM Bands. ................................ - 9 -
Table 3 Showing WLAN Topologies and Application Areas. .............................. - 11 -
Table 4 Organizations/Scenarios, WLAN Applications and Advantages ........... - 12 -
Table 5 IEEE 802.11 family of standards .............................................................. - 19 -
Table 6 Sniffing Tools .............................................................................................. - 25 -
Table 7 Wireless Security Attacks .......................................................................... - 29 -
Table 8 Wireless attacks and countermeasures .................................................... - 38 -

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday xii

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 1 -

Download 470.11 Kb.

Share with your friends:
1   ...   5   6   7   8   9   10   11   12   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page