Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page71/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   63   64   65   66   67   68   69   70   71
FULLTEXT01
ijsrp-p4303

Document Outline

  • Abstract
  • Acknowledgement
  • Table of Contents
  • List of Figures and Tables
    • List of Figures
      • Figure 1: Basic Components of WLAN
      • Figure 2: Frequency Hopping
      • Figure 3: DSSS with CDMA
      • Figure 4: WLAN Ad Hoc Mode
      • Figure 5: WLAN Infrastructure Mode
      • Figure 6: Protocol Structure - IEEE i WLAN Security Standards
      • Figure 7: x Authentication Process (WPA2)
      • Figure 8: General Taxanomy of WLAN Security Attacks
      • Figure 9: Security as a Process
    • List of Tables
      • Table 1: Comparison of WLAN Transmission Technologies
      • Table 2: Showing MHz, 2.4 GHz and 5 GHz ISM Bands
      • Table 3: Showing WLAN Topologies and Application Areas
      • Table 4: Organizations/Scenarios, WLAN Applications and Advantages
      • Table 5: IEEE 802.11 Family of Standards
      • Table 6: Sniffing Tools
      • Table 7: Wireless Security Attacks
      • Table 8: Wireless Attacks and Countermeasures
  • Chapter One
    • 1.0 Introduction
    • 1.1 Problem Statement
    • 1.2 Previous Studies
    • 1.3 Objectives of the Study
    • 1.4 Research Questions
      • 1.4.1 Research question I
      • 1.4.2 Research question II
    • 1.5 Method
    • 1.6 Significance of the Study
    • 1.7 Organisation of the Study
  • Chapter Two
    • 2 Brief Review of Wireless Local Area Network (WLAN)
    • 2.0 Introduction
    • 2.1 Basic WLAN Components
    • 2.2 WLAN Transmission Technologies
      • 2.2.0 Infrared (IR) LANs
      • 2.2.1 Spread Spectrum LANs
      • 2.2.2 Narrowband Microwave LANs
    • 2.3 WLAN Spectrum Allocation
    • 2.4 WLAN Topologies
      • 2.4.0 AD Hoc Mode
      • 2.4.1 Infrastructure Mode
    • 2.5 WLAN Applications
  • Chapter Three
    • 3 Wireless LAN Standards
    • 3.0 Introduction
    • 3.1 The IEEE 802.11 Family of Standards
      • 3.1.0 IEEE 802.11b
      • 3.1.1 IEEE 802.11a
      • 3.1.2 IEEE 802.11g
      • 3.1.3 IEEE 802.11n
    • 3.2 Other IEEE 802.11 Working Group Standard
      • 3.2.0 The IEEE i Standard
    • 3.3 The x Authentication Process
  • Chapter Four
    • 4 WLAN Vulnerabilities, Threats and Countermeasures
    • 4.0 Introduction
    • 4.1 WLAN Security Attacks
      • 4.1.0 Passive Attacks
      • 4.1.1 Active Attacks
    • 4.2 Putting Attacks into Perspective Risk Analysis
    • 4.3 Conducting a Vulnerability Assessment
      • 4.3.0 WLAN Discovery
      • 4.3.1 Vulnerability/Penetration Testing
      • 4.3.2 Using WIPS to Monitor Activity
      • 4.3.3 Using Wireless Analyzers for Investigation
    • 4.4 Putting Assessment Results to Work
  • Chapter Five
  • 5 Conclusion, Summary and Future Research
  • 5.0 Conclusion
  • 5.1 Summary
  • 5.2 Future Research
  • References
  • Appendix

Download 470.11 Kb.

Share with your friends:
1   ...   63   64   65   66   67   68   69   70   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page