Vulnerability Analysis of Wireless LAN Networks Using Penetration Testing Execution Standard: A Case Study of Cafes in Palembang

Author(s):  
Fairuz Zahirah Lidanta ◽  
Ahmad Almaarif ◽  
Avon Budiyono
2012 ◽  
Vol 66 (8) ◽  
pp. 1766-1773 ◽  
Author(s):  
J. Yazdi ◽  
S. A. A. S. Neyshabouri

Population growth and urbanization in the last decades have increased the vulnerability of properties and societies in flood-prone areas. Vulnerability analysis is one of the main factors used to determine the necessary measures of flood risk reduction in floodplains. At present, the vulnerability of natural disasters is analyzed by defining the various physical and social indices. This study presents a model based on a fuzzy rule-based system to address various ambiguities and uncertainties from natural variability, and human knowledge and preferences in vulnerability analysis. The proposed method is applied for a small watershed as a case study and the obtained results are compared with one of the index approaches. Both approaches present the same ranking for the sub-basin's vulnerability in the watershed. Finally, using the scores of vulnerability in different sub-basins, a vulnerability map of the watershed is presented.


2017 ◽  
Vol 42 (4) ◽  
pp. 372-382
Author(s):  
Akalanka Karunarathne Mudiyanselage ◽  
Lei Pan

Author(s):  
Keyurkumar J. Patel

Wireless Technology is growing at a phenomenal rate. Of the many present challenges highlighted by the author, increased security is one of the main challenges for both developers and end users. This chapter presents this important security aspect of implementing a mobile solution in the context of Sydney International airport. After tackling initial challenges and issues faced during the implementation of wireless technology, this chapter demonstrates how security issues and wireless application were implemented at this mobile-intense airport organization. The decision to deploy and manage the wireless spectrum throughout the Airport campus meant that the wireless LAN had to share the medium with public users, tenants and aircraft communications on the same bandwidth. Therefore, this case study also demonstrates invaluable approach to protect unintended users from breach of existing security policies adopted by their corporate network. Authentication and data privacy challenges, as well as complete WLAN connectivity for tenants, public and corporate usage is presented in this case study.


Sign in / Sign up

Export Citation Format

Share Document