WIRELESS ACCESS POINTS VULNERABILITIES AND PROTECTION METHODS FOR THEM
Journal: International Scientific Journal "Internauka" (Vol.1, No. 53)Publication Date: 2018-07-15
Authors : Rvach Dmytro;
Page : 33-35
Keywords : information security; wireless network; Wi-Fi; wireless access point; vulnerability; data transferring;
Abstract
Presently we have widely common technologies for wireless access to global networks which allow us to exchange different (sometimes even valuable) information. That's why the question of them and their errors, problems, vulnerabilities is very actual and important in our times. Because all their problems sometimes may became a big or even fatal problem for usual user. In this article will be described and shown: vulnerabilities in such technologies as WPS and WPA, possibilities of their exploitation for gaining access or for the bypassing of the available protection provided by the access system, and also methods for protection your own wireless networks and your personal information from illegal access by using these vulnerabilities.
Other Latest Articles
- HISTORY OF TELEVISION DEVELOPMENT IN THE CONTEXT OF COMMUNICATION FEATURES OF THE OFF-LINE MODEL
- PHENOMENON OF COLLECTING IN THE CONTEXT OF VISUAL CULTURE
- CONCEPT OF EFFICIENT AND EQUITABLE SELF-REGULATING SOCIO-ECONOMIC SYSTEM
- THE ROLE OF FINANCIAL MANAGEMENT IN THE ACTIVITIES OF ENTERPRISES
- Analysis and Design Rent Toys Application in the Jakarta Region Based on Web
Last modified: 2018-08-08 01:47:29