wireless network security
Recently Published Documents


TOTAL DOCUMENTS

175
(FIVE YEARS 24)

H-INDEX

10
(FIVE YEARS 2)

SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


Author(s):  
Rashid Nazir ◽  
Asif Ali laghari ◽  
Kamlesh Kumar ◽  
Shibin David ◽  
Munwar Ali

2021 ◽  
Author(s):  
Jiangchuan Chen ◽  
Tao Yang ◽  
Baolin He ◽  
Lingling He

Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


Author(s):  
R.Yu Korolkov ◽  
S.V. Kutsak

Purpose. Analysis of the main types of vulnerabilities and definition of weaknesses in 802.11 wireless network security, identification of the causes of information loss or network failure as a result of attacks. Methodology. Research on attacks at different levels of the OSI network model. Findings. The main threats and attacks that are implemented at each level of the OSI network model, from the physical to the application level, are identified. 15 different attacks with a detailed description of the consequences of their implementation are considered. The correspondence between the levels of the OSI network model and peculiarities of the implementation of attacks is established. Originality. The principle of increasing the abstraction level was used to systematize attacks on WLAN. First, the known attacks are compared according to the levels of the OSI network model and the destructive consequences of their implementation are indicated; secondly, four types of attacks (reconnaissance, availability, spoofing, man-in-the-middle) are identified, and thirdly, attacks are divided into categories of passive and active ones. This approach makes it possible to get a more conceptual understanding of security issues in wireless networks. Practical value. The results obtained can be used to develop effective multi-level systems for detecting and preventing intrusions into WLAN.


2020 ◽  
Vol 8 (5) ◽  
pp. 26-42
Author(s):  
Bassey Ele ◽  
Odey John Adinya ◽  
Obono, I. O

Wireless network systems and cybersecurity threats are growing faster than their mitigation measures. World Economic Forum has identified wireless network security and cybersecurity threats as its top global risks for the past eight years. This paper aims to critically examine the impact of emerging wireless network systems and cybersecurity in a global community and suggest some best countermeasures against wireless and cybersecurity threats that have been of global concern. To achieve this, the study conducted an in-depth review of wireless network security and cybersecurity.  This study has presented a robust wireless security mechanism and suggests appropriate countermeasure against wireless network and cybersecurity threats that is more cost-effective in mounting attacks in the service area, and simultaneously providing higher security than basic security mechanisms.


Sign in / Sign up

Export Citation Format

Share Document