scholarly journals Implementasi Sistem Keamanan WPA2-PSK pada Jaringan WiFi

2018 ◽  
Vol 3 (1) ◽  
Author(s):  
Baihaqi . ◽  
Yeni Yanti ◽  
Zulfan .

Nowadays the use of WiFi network technology device has been widely developed around the world, both used for voice and data communications. WiFi networks utilize high frequencies to deliver and connect a communication, then the vulnerability to security is also higher than with other communication technologies. Various security measures can be done through communication devices used by users or by operators who provide communication services. However, with the user who utilizes WiFi network technology, it can provide little security hole that can be exploited by the attacker. Then the attacker can find out the WPA2-PSK security password when the user connects to the WiFi network. So the resulting password through several techniques and testing used. Among them by utilizing the user connected to the WiFi network, testing fake SSID and testing WPS PIN. However, in this study only conducted testing through a user connected to a WiFi network. This technique and testing is solely done to penetrate the security of WiFi network, which aims to know the password of WPA2-PSK on WiFi network and to add insight about WiFi network security

2014 ◽  
Vol 1044-1045 ◽  
pp. 1298-1301
Author(s):  
Qian Wu

Early network development, people more emphasis on network convenience and availability, and ignore the security of the network. With the development of computer network technology, when people run in the network critical business such as banking, when government activity is increasingly networked, computer network security has become a problem that not allows to ignore. In this paper, the existing network security technology to prevent the analysis and comparison, especially to strengthen security measures should be taken in order to do a more in-depth discussion, and describes the future development trend of this research field.


2020 ◽  
Author(s):  
Antoni

The rapid development of network technology, has made the use of network switching from using the cable to the use of wireless networks. Because wireless network technology utilizes high frequencies to transmit data, security vulnerabilities are also higher than wired network technologies. Various security measures can be done through network devices used by users or by operators who provide hotspot services. On the other hand, there are many methods used by hackers to steal user information over this wireless network. One commonly used method is Evil twin Attack or often called Rogue AP (acces point) which means fake access point. On any wireless networking device, there is a MAC (Medium Access Control) address that can be forged and used to redirect an Access Point artificial identity as the original Access Point. In this method, all users connected on the network will be sent a deauthetication frame that makes it disconnected from the network and immediately try to reconnect with the artificial Access Point that has been prepared by the hacker. After the user reconnects the network, indirectly the user has connected to the access point that has been prepared to do the attack, not the original access point.


Author(s):  
E. Ramganesh ◽  
E. Kirubakaran ◽  
D. Ravindran ◽  
R. Gobi

The m-Governance framework of auniversity aims to utilize the massive reach of mobile phones and harness the potential of mobile applications to enable easy and round the-clock access to the services of its affiliated institutions.  In the current mobile age there is need for transforming e-governance services to m-Governance as m-Governance is not a replacement for e-Governance rather it complements e-Governance. With this unparalleled advancement of mobile communication technologies, universities are turning to m-governance to realize the value of mobile technologies for responsive governance and measurable improvements to academic, social and economic development, public service delivery, operational efficiencies and active stakeholder engagement. In this context the present study, aims to develop and validate a m-governance framework of a university by extending Technology Acceptance Model (TAM) with its prime stakeholders so called the Heads of the affiliated institutions. A survey instrument was developed based on the framework and it was administered with 20 Heads of the affiliated Institutions. The results also showed that the Heads of the affiliated Institutions expressed their favorableness towards m-governance adoption.


Author(s):  
Maryna Demyanchuk

Information and telecommunication services are currently a full-fledged resource for social development compared to traditional resources. The growth of the level of scientific and technological progress has led to the incredibly fast development paces in the sphere of information and communication technologies, which has a significant impact on the development of the economy. On the basis of a thorough analysis of the sectors of information and communication technologies and components of the ICT development index, the article substantiates the need for accelerated digitization of the majority of enterprises of different spheres of economic activity with the aim of qualitative development of Ukrainian economy in order to increase its competitiveness in the world. This is explained by the fact that information and technology represent the main economic resource in the period of formation of information society and digital economy, and enterprises of the sphere of communication and informatization are a catalyst for social and economic development of the country as a whole. Using a methodological toolkit of the theory of systematic and correlation-regression analysis, an economic-mathematical model of the development of the sphere of communication and informatization in the regions of the world and individual countries of the world is constructed. It is based on the existing pattern of leading development of the communications sector, but takes into account the degree of economy dependence on the ICT development, which in some regions and countries is 100%. This is due to the approaching mass availability of ICT services in some countries in these regions. On the basis of the constructed model, the forecasting of GDP PPP per capita was carried out, which showed faster rates of growth of the country’s economy with the growth of the development level of the sphere of communication and informatization and accessibility of telecommunication services. In turn, the availability of telecommunication services is influenced by the digital skills of society and the level of their prices, which has necessitated determining the dependence of GDP PPP per capita on prices for communication services of countries with varying degrees of socio-economic development. This makes it possible to identify reserves for improving the productivity of individuals while increasing the availability of telecommunications services.


2016 ◽  
Vol 2 (3) ◽  
pp. 528
Author(s):  
Ako Abubakr Jaffar ◽  
Mazen Ismaeel Ghareb ◽  
Karzan Hussein Sharif

The Retailers all over the world are prospering from the burgeoning trend of online shopping. Kurdistan Regional Government is still struggling to grow its e-commerce markets. On the other hands e-commerce in Various countries in the Middle East have some of the world’s highest internet and mobile penetration rates. Alternative payments methods are quickly expanding, and having access to some of the world’s most coveted natural resources that allows countries in their region to have some of the highest GDP in the world. There are several challenges prevalent in the KRG Region market that will require international merchants to develop strategies based on innovation and vigilance. This unique region is plagued with complications many other countries have little to no experience with e-commerce, which highlights the need for retailers to have a deep understanding as to how this region operates before they can begin finding solutions. One of the biggest concerns today's consumers have is the risk of fraud when they are shopping online. With highly sophisticated malware and perceptive cybercriminals, customers' card and bank information can easily be stolen if a merchant does not take the proper security measures. In this paper we summarize all challenges need to be addressed in KRG in order to make correct steps to apply e-commerce in KRG. Finally, the recommendations and framework are proposed for e-commerce to encourage government, organizations, and people to take advantages from e-commerce.


Author(s):  
Matthew A. Shadle

In recent years the economy has become globalized. Globalization is the increased flow of goods, services, capital, people, and culture facilitated by innovations in transportation and communication technologies. This chapter examines the phenomenon of globalization and its impact on Catholic social teaching. It looks, in particular, at Pope Benedict XVI’s encyclical Caritas in Veritate. Pope Benedict criticizes how the current global economy exploits and excludes vulnerable populations around the world. Caritas in Veritate further develops the communio framework initiated by John Paul II and proposes that the communion of the three Persons of the Trinity provides a model for the shape globalization should take, recognizing unity in the midst of diversity. The chapter also looks at how Catholic social thought itself is globalizing, examining in particular the work of Mary Mee-Yin Yuen from Hong Kong and Stan Chu Ilo from Nigeria.


2013 ◽  
Vol 433-435 ◽  
pp. 1720-1723
Author(s):  
Jun Ruan ◽  
Pan Zhang ◽  
Hong Bi Ding

With the rapid development of computer network technology, global information has become mega-trend of modern social development. But due to all kinds of defects existing in the network itself and variety and openness of network interconnection form, network security has become the focus of social attention. So in this paper, a lot of current advanced network security technologies and products are used in order to make network security, which is under the general principles of network security situation.


2020 ◽  
Vol 17 (2) ◽  
pp. 55-62
Author(s):  
M. V. Bikeeva ◽  
K. V. Belash

Purpose of the study. Information and communication technologies are becoming a powerful tool for the development of electronic business. Today, the leaders in the global economic and political space are precisely those countries that have learned to determine the vector of development of information technologies and use new opportunities for their application. The development of innovative digital technologies in Russia and in the world is widely discussed in the framework of various discussion platforms. In particular, at the International Forum “The Digital Future of the Global Economy” (January 31, 2020 Almaty), digitalization of trade processes between the EAEU membercountries became one of the main topics. The annual Tech Week conference (Moscow) is becoming a traditional place for discussing the implementation of innovative technologies in business, as well as for the exchange of experience of leading Russian and world corporations in the field of electronic business. In this regard, there is a need for a comprehensive statistical assessment of the development level of electronic business of the territory.Materials and methods. The research was based on the data of the Federal State Statistics Service for 2018 for the regions of the Volga federal district, and the results of monitoring the development of the information society in the Russian Federation. As a tool for assessing the degree of digitalization of business in the regions of the Volga federal district, the graphic polygon (radar) method is used.Results. The article provides a retrospective analysis of the stages of development of electronic business in Russia. Among the characteristic features of the modern stage of its development are the mass introduction of Internet technologies and the transformation of traditional business methods. The introduction of advanced information and communication technologies contributes to greater involvement of the business sector in electronic business. In terms of the level of development of information and communication technologies (ICT Development Index), Russia ranks 45th among the countries of the world. For the period 2010 - 2018 the development of electronic business in Russia has a positive trend. According to the results of 2018, the volume of the Russian e-commerce market amounted to 1280 billion rubles, or 4.1% of the total trade turnover. According to forecast estimates, by 2023 the volume of Russian e-commerce market will grow to 8.5% of the total turnover and amount to 2780 billion rubles. An integrated assessment of the development level of electronic business was carried out according to sixteen local criteria. As a result of calculating the private and local ranks of the values of the relevant criteria, fourteen polygons of the level of development of electronic business were constructed by the number of regions of the Volga federal district. The results obtained allow us to state the existence of a high degree of heterogeneity of the regions of the Volga federal district according to the integral indicator under study. Among the leading regions in terms of electronic business development are the Republic of Tatarstan, Perm krai and Nizhny Novgorod region. Outsider regions – the Mari El Republic, the Republic of Mordovia, and the Kirov region – are characterized by a low percentage of organizations that used the capabilities of the Intranet and Extranet, the absence of special software for managing sales of goods (works, services), and limited use of software, in particular ERP, CRM and SCM systems.Conclusion. The widespread use of information and communication technologies entails the expansion of opportunities and improving the quality of coordination of business activities. We should remember that if modern business cannot quickly adapt to the new requirements of the digital economy, then it risks becoming uncompetitive. The results of the study revealed a differentiation in the development of electronic business in the regions of the Volga federal district. A similar situation is observed in most constituent entities of the Russian Federation and is due in many respects to specific reasons for each region. The timely fulfillment of the goals and objectives of digital transformations in the Russian Federation reflected in the Digital Economy of the Russian Federation Program and other regulatory documents will help to smooth out the existing imbalances.


Sign in / Sign up

Export Citation Format

Share Document