wireless lan security seminars report
#5
Submitted By:
Gurjeet Barar

[attachment=12569]
INTRODUCTION
• wireless networking –readily available, affordable and easy to use.
• popularity of wireless networking in private and commercial areas business.
• Interfaces with public areas.
• Some Wi-Fi operaters do not deploy any network security.
• Wired Equivalent Privacy as its default security protocol—widely recognized as being easily broken.
Unauthorised Access cases
Access to Computers :
• To deface/change information
• To obtain information
• To copy information
• To affect operation
Access to Networks :
• To obtain access
• To mask identity
Wireless Hacking
Examples of possible conduct or security failure.
exploiting the vulnerability of a wireless network to hack into the computer or computer system.
unauthorized (or in excess of authorization) access to a computer to steal information for their own purposes (data theft).
unauthorized (or in excess of authorization) access to a computer to deface information for their own purposes (malicious hackers).
Eavesdropping: monitoring the wireless transmissions.
interception of electronic communication.
intentionally disclosure of the contents of electronic communication.
Privacy Challenges
Anything connected can potentially be tracked
Who should be able to track what?
Balancing business benefits and privacy
e.g., track the product in the store, but not on the consumer
Cryptography offers new tradeoffs
WLAN Security: Why it matter?
International concerns.
Access point ≈ Wireless Hub
Difficult to trace attackers
Low cost hacking equipment
Typical insecure WLAN deployments
Lack of user/admin security awareness
Technology limitations & vulnerabilities
WLAN Security Threats
WLAN Security Threats
User hijacking & Man-in-the-middle attack
Inverse Wardriving
Sniff & Modify
Fake server
Https hack
Password stealing
“Phishing”
Advantages
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult to lay cable.
Installation is fast and easy, and it can eliminate the need to pull cable through walls and ceilings.
Access to the network can be from anywhere within range of an access point.
Portable or semipermanent buildings can be connected using a WLAN.
Although the initial investment required for WLAN hardware can be similar to the cost of wired LAN hardware, installation expenses can be significantly lower.
Disadvantages
As the number of computers using the network increases, the data transfer rate to each computer will decrease accordingly.
As standards change, it may be necessary to replace wireless cards and/or access points.
Lower wireless bandwidth means some applications such as video streaming will be more effective on a wired LAN.
Security is more difficult to guarantee and requires configuration.
Devices will only operate at a limited distance from an access point, with the distance determined by the standard used and buildings and other obstacles between the access point and the user.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: who is trevor potter, virtual lan technology ppt seminar, aps grilles, wireless lan ppt, report on virtual lan technology, virtal lan technology report download, wireless lan system,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: wireless lan security seminars report - by seminar class - 21-04-2011, 03:17 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,040 24-11-2018, 01:19 AM
Last Post:
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 31,609 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,204 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,610 26-02-2015, 08:03 PM
Last Post: Guest
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,731 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Bluetooth Security Full Download Seminar Report and Paper Presentation computer science crazy 21 26,585 07-08-2014, 11:32 PM
Last Post: [email protected]
  Data Security in Local Network using Distributed Firewalls computer science crazy 10 15,240 30-03-2014, 04:40 AM
Last Post: Guest
Music Blast Wireless (Download Full Report And Abstract) computer science crazy 8 6,687 18-02-2014, 01:13 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,840 08-10-2013, 04:32 PM
Last Post: Guest
  WiMAX for Broadband Wireless Access full report seminar topics 7 7,400 07-10-2013, 09:02 PM
Last Post: Guest

Forum Jump: