Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]


PUTTING ATTACKS INTO PERSPECTIVE RISK ANALYSIS ...... - 32 -



Download 470.11 Kb.
View original pdf
Page7/71
Date10.09.2021
Size470.11 Kb.
1   2   3   4   5   6   7   8   9   10   ...   71
4.2
PUTTING ATTACKS INTO PERSPECTIVE RISK ANALYSIS ...... - 32 -
4.3
CONDUCTING A VULNERABILITY ASSESSMENT ......................... - 34 -
4.3.0
WLAN DISCOVERY ......................................................................... - 34 -
4.3.1
VULNERABILITY/PENETRATION TESTING ............................ - 35 -
4.3.2
USING WIPS TO MONITOR ACTIVITY ...................................... - 35 -
4.3.3
USING WIRELESS ANALYZERS FOR INVESTIGATION ....... - 36 -
4.4
PUTTING ASSESSMENT RESULTS TO WORK ................................. - 36 -
CHAPTER FIVE ........................................................................................................ - 41 -
5
CONCLUSION, SUMMARY AND FUTURE RESEARCH ......................... - 41 -
5.0
CONCLUSION ........................................................................................... - 41 -
5.1
SUMMARY ................................................................................................. - 42 -

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday ix
5.2
FUTURE RESEARCH ............................................................................... - 42 -
REFERENCES: ...................................................................................................... - 45 -
APPENDIX .............................................................................................................. - 51 -

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday x

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday xi

Download 470.11 Kb.

Share with your friends:
1   2   3   4   5   6   7   8   9   10   ...   71




The database is protected by copyright ©ininet.org 2020
send message

    Main page