CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems
Wireless Security
Topics
1. Wireless Fundamentals 2. Wireless Discovery 3. WEP Insecurity 4. WAP2 Security
Welcome to Wireless
Radio waves
Security concerns
? No need to be physically plugged into the network.
? Radio signals leaking outside buildings (sniffing).
? Unlicensed spectrum in the 2.4 and 5 GHz ranges.
? Detection of unauthorized devices.
Coverage
? Personal Area Network (PAN). ? Local Area Network (WLAN). ? Metropolitan Area Network
(MAN).
? Intercepting wireless communications.
? Man-in-the-middle attacks. ? Verification of users. ? Restricting access.
11/21/2013
Wireless Networks 3
IEEE 802.11
Family of IEEE networking standards for creating wireless local area networks.
Standard Year Frequency
802.11a 1999 5 GHz 802.11b 1999 2.4 GHz 802.11g 2003 2.4 GHz 802.11n 2009 2.4 and 5 GHz 802.11ac 2014 5 GHz 802.11ad 2012 2.4, 5, and 60 GHz
Data Rate Per Stream 54 Mbps 11 Mbps 54 Mbps 150 Mbps 867 Mbps 6912 Mbps
Allowable Streams
1 1 1 4 8
802.11 in the OSI Model
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- grand canyon university my resource center handbook for
- 2018 2019 walden university student handbook
- guide to the doctoral dissertation research process
- cit 380 securing computer systems
- grand canyon university faculty handbook
- a guide to comprehensive needs assessment
- nurse practitioner core competencies content
- sample discussion board post
- walden university student handbook
- spss installation instructions
Related searches
- introduction to computer systems pdf
- computer systems manager job description
- computer systems analyst skills
- computer systems analyst certification
- computer systems analyst
- computer systems 3rd pdf
- types of computer systems pdf
- what computer systems are there
- computer systems analyst indeed
- computer systems analysts information
- computer systems analyst jobs
- computer systems analyst requirements