Jump to content
Nytro

Methodology: Security plan for wireless networks

Recommended Posts

Posted

Methodology: Security plan for wireless networks

By: Stephen Blair Mandeville A.

Summary

The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but also has the consequence of having to use security mechanisms and data encryption. This conclusion is based on the needs and problems that arise with everyday use of wireless networks. These consequences, far from presenting small problems, can be large and disastrous in some cases. The magnitude of the problem isn’t the determinant of its importance as the smallest detail can result in an irreparable loss not only financially but also of information.

Our research begins with the 802.11 standard and discusses its general characteristics. Then we focus on the analysis and implementation of WPA2 technology and different security plans as a solution to current problems.

Actually the important increase in the use of wireless networks has resulted in the development of security mechanisms that were initially overcome by malicious users. This is why it is proposed to implement WPA2 technology as standard security in all types of wireless networks using a methodology that consist of: the password creation, security plan creation, and software protection permitting greater wireless network complexity and security.

Download:

http://www.exploit-db.com/wp-content/themes/exploit/docs/31170.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...