Wireless Network Access and Authentication, DSC - Graduate Diploma in ICT
VerifiedAdded on  2023/06/04
|14
|3396
|360
AI Summary
This report discusses wireless network access and authentication protocols for personal/home and corporate/enterprise networks. It also covers the concept of desired state configuration (DSC) and its importance for system administrators. The report highlights the impact of DSC on administrative burden and alternative technologies such as Ansible, Puppet, Salt, and Chef.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: GRADUATE DIPLOMA IN ICT
Graduate Diploma in ICT
Name of the Student
Name of the University
Author Note
Graduate Diploma in ICT
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1
GRADUATE DIPLOMA IN ICT
Table of Contents
Part 1: Wireless Network Access and Authentication.........................................................2
1.1. Introduction...............................................................................................................2
1.2. Personal/Home wireless Authentication...................................................................2
1.3. Corporate/ Enterprise wireless authentication..........................................................4
1.4. Conclusion................................................................................................................5
Part 2: DSC..........................................................................................................................7
2.1. Introduction...............................................................................................................7
2.2. Desired State Configuration.....................................................................................7
2.3. Importance of DSC for system Administrators........................................................8
2.4. Impact on Administrative Burden and Alternative Technology...............................9
2.5. Conclusion..............................................................................................................10
References..........................................................................................................................11
GRADUATE DIPLOMA IN ICT
Table of Contents
Part 1: Wireless Network Access and Authentication.........................................................2
1.1. Introduction...............................................................................................................2
1.2. Personal/Home wireless Authentication...................................................................2
1.3. Corporate/ Enterprise wireless authentication..........................................................4
1.4. Conclusion................................................................................................................5
Part 2: DSC..........................................................................................................................7
2.1. Introduction...............................................................................................................7
2.2. Desired State Configuration.....................................................................................7
2.3. Importance of DSC for system Administrators........................................................8
2.4. Impact on Administrative Burden and Alternative Technology...............................9
2.5. Conclusion..............................................................................................................10
References..........................................................................................................................11
2
GRADUATE DIPLOMA IN ICT
Part 1: Wireless Network Access and Authentication
1.1. Introduction
Wireless network technology is mostly used in modern network. This is mostly because
of its ease of access and the increasing advantages it provides on basis of wired network. A
wireless networking point or device is a networking hardware device that allows a WIFI enabled
device to connect to a wired network. Authentication is wireless network is essential for
improving the security of the wireless devices. Appropriate authentication allows only the trusted
individuals to access a network of wireless devices thus ensuring its secure usage (Vilius, Liu,
Panneerselvam & Stimpson, 2015). Authentication of a network is a security process that
validates the authenticity or identity of a user by making use of a valid username and a password.
The different wireless data security protocols and wireless network authentication process related
to personal network, home and enterprise network are discussed in the following paragraphs.
1.2. Personal/Home wireless Authentication
For home wireless authentication, three wireless authentication protocols can be used,
which are WEP, WPA and WPA2. For home or personal wireless authentication, WPA2 is
mostly used.
WEP or Wired Equivalent privacy is a security algorithm that is generally used for IEEE
802.11 wireless networks (Waliullah, Moniruzzaman & Rahman, 2015). It makes use of a four
step challenge response handshake for authentication and security. It is one of the most primitive
methods of authentication and is hardy used nowadays because of the different security issues
associated with WEP.
GRADUATE DIPLOMA IN ICT
Part 1: Wireless Network Access and Authentication
1.1. Introduction
Wireless network technology is mostly used in modern network. This is mostly because
of its ease of access and the increasing advantages it provides on basis of wired network. A
wireless networking point or device is a networking hardware device that allows a WIFI enabled
device to connect to a wired network. Authentication is wireless network is essential for
improving the security of the wireless devices. Appropriate authentication allows only the trusted
individuals to access a network of wireless devices thus ensuring its secure usage (Vilius, Liu,
Panneerselvam & Stimpson, 2015). Authentication of a network is a security process that
validates the authenticity or identity of a user by making use of a valid username and a password.
The different wireless data security protocols and wireless network authentication process related
to personal network, home and enterprise network are discussed in the following paragraphs.
1.2. Personal/Home wireless Authentication
For home wireless authentication, three wireless authentication protocols can be used,
which are WEP, WPA and WPA2. For home or personal wireless authentication, WPA2 is
mostly used.
WEP or Wired Equivalent privacy is a security algorithm that is generally used for IEEE
802.11 wireless networks (Waliullah, Moniruzzaman & Rahman, 2015). It makes use of a four
step challenge response handshake for authentication and security. It is one of the most primitive
methods of authentication and is hardy used nowadays because of the different security issues
associated with WEP.
3
GRADUATE DIPLOMA IN ICT
WPA or WiFi protected access is another wireless authentication protocol that can be
used for solving certain security problems associated with the use of wireless networks. It
provides a more sophisticated data encryption and authentication over WEP (Sari & Karay,
2015). The WPA used for secure home or personal network is also called WPA-PSK or WPA
personal.
WPA 2 or Wifi protected access II is a authentication protocol that is mostly used in
home networks. This authentication protocol is based on IEEE 802.11i technology of standard
encryption. WPA 2 provides an additional layer of security to the wireless network in
comparison to WPA (Khasawneh, Kajman, Alkhudaidy & Althubyani, 2014). WPA2 for
personal use mainly utilize manually configured keys for authentication. The clients in this
method make use of same master key. This standard was finalized in June 2004 and it makes use
of counter mode and CCMP protocol which is based on advanced encryption standard algorithm
for authentication and data encryption. WPA2 is one of most secure authentication protocol and
therefore is widely used for protecting the home and the personal wireless networks.
Appropriate administration of the devices associated with home or personal wireless
network is essential in order to ensure that no data is lost. With the use of appropriate wireless
authentication protocols, the administrative burden could considerably be reduced. WPA2
mainly works on basis of a pre shared key that ensures accurate security of the devices connected
to the home network.
The WPA-PSK or WPA II is generally designed for home users. The configuration
process of the devices includes configuration of the router by making use of a Temporal key
GRADUATE DIPLOMA IN ICT
WPA or WiFi protected access is another wireless authentication protocol that can be
used for solving certain security problems associated with the use of wireless networks. It
provides a more sophisticated data encryption and authentication over WEP (Sari & Karay,
2015). The WPA used for secure home or personal network is also called WPA-PSK or WPA
personal.
WPA 2 or Wifi protected access II is a authentication protocol that is mostly used in
home networks. This authentication protocol is based on IEEE 802.11i technology of standard
encryption. WPA 2 provides an additional layer of security to the wireless network in
comparison to WPA (Khasawneh, Kajman, Alkhudaidy & Althubyani, 2014). WPA2 for
personal use mainly utilize manually configured keys for authentication. The clients in this
method make use of same master key. This standard was finalized in June 2004 and it makes use
of counter mode and CCMP protocol which is based on advanced encryption standard algorithm
for authentication and data encryption. WPA2 is one of most secure authentication protocol and
therefore is widely used for protecting the home and the personal wireless networks.
Appropriate administration of the devices associated with home or personal wireless
network is essential in order to ensure that no data is lost. With the use of appropriate wireless
authentication protocols, the administrative burden could considerably be reduced. WPA2
mainly works on basis of a pre shared key that ensures accurate security of the devices connected
to the home network.
The WPA-PSK or WPA II is generally designed for home users. The configuration
process of the devices includes configuration of the router by making use of a Temporal key
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4
GRADUATE DIPLOMA IN ICT
integrity protocol (Adnan et al., 2015). This protocol is mainly used for generation of a unique
encryption key for each wireless client associated with the network.
1.3. Corporate/ Enterprise wireless authentication
Wired Equivalent privacy or WEP is incapable of providing adequate security to the
corporate or wireless network. This is mainly because it is more prone to hacking. Therefore, for
authentication and security of corporate or wireless authentication network, WPA or Wireless
protected access authentication and encryption protocol is mainly used. WPA-enterprise is a
wireless security protocol that is mainly designed for all types of enterprises, be it small, medium
or large. It is an enhancement to the existing wireless security protocol that makes use of certain
advanced authentication and encryption protocol (Kumar & Gambhir, 2014). The user
authentication in WPA-enterprise is managed by making use of Remote Authentication Dial-in
User service or RADIUS. WPA-enterprise is similar to WPA-PSK in a number of aspects;
however, WPA-enterprise requires each user to self authentication through a RADIUS server for
improved protection. In this authentication protocol, a long encryption key is generally assigned
to each of the connected devices (Sharma, Mishra & Singh, 2013). Furthermore, the key that is
shared with the users are invisible which makes it practically impossible to break the security.
This authentication protocol mainly makes use of AES or advanced encryption standard for
ensuring extra protection.
Thus it can be said that the enterprise variant of WPA is secure as it makes use of
RADIUS server for user authentication. This is one of the primary reasons behind the fact that
WPA enterprise provides an additional security in comparison to WPA2. WPA2 is mainly used
for personal users and it operates on basic of pre shared keys. For accessing the wireless
GRADUATE DIPLOMA IN ICT
integrity protocol (Adnan et al., 2015). This protocol is mainly used for generation of a unique
encryption key for each wireless client associated with the network.
1.3. Corporate/ Enterprise wireless authentication
Wired Equivalent privacy or WEP is incapable of providing adequate security to the
corporate or wireless network. This is mainly because it is more prone to hacking. Therefore, for
authentication and security of corporate or wireless authentication network, WPA or Wireless
protected access authentication and encryption protocol is mainly used. WPA-enterprise is a
wireless security protocol that is mainly designed for all types of enterprises, be it small, medium
or large. It is an enhancement to the existing wireless security protocol that makes use of certain
advanced authentication and encryption protocol (Kumar & Gambhir, 2014). The user
authentication in WPA-enterprise is managed by making use of Remote Authentication Dial-in
User service or RADIUS. WPA-enterprise is similar to WPA-PSK in a number of aspects;
however, WPA-enterprise requires each user to self authentication through a RADIUS server for
improved protection. In this authentication protocol, a long encryption key is generally assigned
to each of the connected devices (Sharma, Mishra & Singh, 2013). Furthermore, the key that is
shared with the users are invisible which makes it practically impossible to break the security.
This authentication protocol mainly makes use of AES or advanced encryption standard for
ensuring extra protection.
Thus it can be said that the enterprise variant of WPA is secure as it makes use of
RADIUS server for user authentication. This is one of the primary reasons behind the fact that
WPA enterprise provides an additional security in comparison to WPA2. WPA2 is mainly used
for personal users and it operates on basic of pre shared keys. For accessing the wireless
5
GRADUATE DIPLOMA IN ICT
network, the said pre shared key is used which is vulnerable to attack (Cassola, Robertson,
Kirda & Noubir, 2013). However, in WPA enterprise, the authentication is based on a back end
RADIUS server and therefore, it needs and access to username and password for gaining an
access to the wireless network thus providing an additional layer of security.
Since WPA enterprise provides the much needed security for enterprise network, it
considerably reduces the administrative burden. Configuration of devices in WPA enterprise
includes configuration of the RADIUS server and self authentication of the same by each of the
users. For user authentication, a long encryption key is assigned to each of the connected devices
in the network (Narayan, Jayawardena Wang & Ma, 2015). The user authentication associated
with the access of the network is mainly based on their account certificates.
WPA enterprise is the latest security protocol that is developed by WI-Fi Alliance along
with the WPA-PSK (Kurup, Shah & Shah, 2014). The system requirements for configuration of
WPA enterprise include Microsoft windows server, Microsoft active directory and RADIUS
authentication service and IIS.
1.4. Conclusion
Use of wireless networks has mostly seen a rise in the recent years mainly because of the
advantages and benefits it provides. Wireless network is quite easy to set up and is easy to use as
well in comparison to wired network. However, one of the major concerns associated with the
use of wireless network is that, it is quite prone to attacks. In order to ensure that the security
risks and issues will be minimized, it is essential to make use of appropriate security and
authentication protocols for secure use. Therefore, for home or personal uses, WPA2 is
recommended while that of enterprise use, WPA enterprise is recommended. Both the protocols
GRADUATE DIPLOMA IN ICT
network, the said pre shared key is used which is vulnerable to attack (Cassola, Robertson,
Kirda & Noubir, 2013). However, in WPA enterprise, the authentication is based on a back end
RADIUS server and therefore, it needs and access to username and password for gaining an
access to the wireless network thus providing an additional layer of security.
Since WPA enterprise provides the much needed security for enterprise network, it
considerably reduces the administrative burden. Configuration of devices in WPA enterprise
includes configuration of the RADIUS server and self authentication of the same by each of the
users. For user authentication, a long encryption key is assigned to each of the connected devices
in the network (Narayan, Jayawardena Wang & Ma, 2015). The user authentication associated
with the access of the network is mainly based on their account certificates.
WPA enterprise is the latest security protocol that is developed by WI-Fi Alliance along
with the WPA-PSK (Kurup, Shah & Shah, 2014). The system requirements for configuration of
WPA enterprise include Microsoft windows server, Microsoft active directory and RADIUS
authentication service and IIS.
1.4. Conclusion
Use of wireless networks has mostly seen a rise in the recent years mainly because of the
advantages and benefits it provides. Wireless network is quite easy to set up and is easy to use as
well in comparison to wired network. However, one of the major concerns associated with the
use of wireless network is that, it is quite prone to attacks. In order to ensure that the security
risks and issues will be minimized, it is essential to make use of appropriate security and
authentication protocols for secure use. Therefore, for home or personal uses, WPA2 is
recommended while that of enterprise use, WPA enterprise is recommended. Both the protocols
6
GRADUATE DIPLOMA IN ICT
ensures user authentication that in turn ensures that any unauthorised access to the network is
prevented.
GRADUATE DIPLOMA IN ICT
ensures user authentication that in turn ensures that any unauthorised access to the network is
prevented.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7
GRADUATE DIPLOMA IN ICT
Part 2: DSC
2.1. Introduction
DSC or desired state configuration is an important feature in windows server 2012and
Powershell 4.0. It helps the windows administrators in managing and deploying the configuration
data of the services. The desired state configuration provides a set of power shell language for
declarative scripting. An accurate use of desired state configuration can possibly help different
organization in avoiding certain drifts in configuration and during modification of any default
settings (Bukowiec, Gaspar & Smith, 2017). Thus it can be said that desired state configuration
is important for system administrators as well. The aim of this section of report is to understand
the concept of desired state configuration and its importance for the system administrators. The
details of desired state configuration are provided in the following sections.
2.2. Desired State Configuration
A desired state configuration is a special function of PowerShell that helps in defining the
process by which one can configure a system. Thus DSC can be described as a PowerShell
extension that has a number of roles to play. PowerShell desired state configuration helps in
installation or removal of different server roles and features (Wilson, 2014 ). It helps in
management of the registry settings, management of files and directories and so on. Powershell
DSSC is important for a number of other functions as well. It helps in controlling and
management of different services and processes and further helps in managing the local groups
and user accounts (Zacker, 2014). PowerShell DSC is important for installation and management
of different packages that includes .msi and .exe packages. Apart from that, the PowerShell DSC
is important for discovery of the actual or default configuration of a particular node.
GRADUATE DIPLOMA IN ICT
Part 2: DSC
2.1. Introduction
DSC or desired state configuration is an important feature in windows server 2012and
Powershell 4.0. It helps the windows administrators in managing and deploying the configuration
data of the services. The desired state configuration provides a set of power shell language for
declarative scripting. An accurate use of desired state configuration can possibly help different
organization in avoiding certain drifts in configuration and during modification of any default
settings (Bukowiec, Gaspar & Smith, 2017). Thus it can be said that desired state configuration
is important for system administrators as well. The aim of this section of report is to understand
the concept of desired state configuration and its importance for the system administrators. The
details of desired state configuration are provided in the following sections.
2.2. Desired State Configuration
A desired state configuration is a special function of PowerShell that helps in defining the
process by which one can configure a system. Thus DSC can be described as a PowerShell
extension that has a number of roles to play. PowerShell desired state configuration helps in
installation or removal of different server roles and features (Wilson, 2014 ). It helps in
management of the registry settings, management of files and directories and so on. Powershell
DSSC is important for a number of other functions as well. It helps in controlling and
management of different services and processes and further helps in managing the local groups
and user accounts (Zacker, 2014). PowerShell DSC is important for installation and management
of different packages that includes .msi and .exe packages. Apart from that, the PowerShell DSC
is important for discovery of the actual or default configuration of a particular node.
8
GRADUATE DIPLOMA IN ICT
Desired state configuration is therefore can be described as a declarative platform that is
mainly used for configuration, management and deployment of certain system. The three primary
concepts of DSC include configurations, resources and local configuration manager (Wilson,
2015). Configurations can be described a declarative power-shell scripts that defines and
configures the instances of the associated resources. The net component, which is the resources,
contains certain codes that help in keeping the target of a configuration in a specified state
(Herry, Anderson & Rovatsos, 2013). The local configuration manger on the other hand acts as
an engine that helps the DSC in facilitating the interaction between their resources and the
configuration of the resources.
The PowerShell desired state configuration is flexible enough to provide reliable and
consistent functions in each state of deployment life cycle. It can be seen that the desired state
configuration mainly centres around configurations, which is an easy to read document having
specific characteristics. One of the significant benefits of desired state configuration is that it
helps in making the deployment of specific sets of machines considerably less error prone
(Hermanns & Steffens, 2015). With desired state configuration, both on premise and off premise
deployments can be managed. The pull server associated with the desired state configuration is
used for centralizing the management of machines and their status reporting.
2.3. Importance of DSC for system Administrators
Working with desired state configuration can bring about certain advantages for the
system administrators. One of the major advantages is the easy deployment. This is possible
mainly because the desired state configuration is a versatile feature that enables consistent
deployment and maintenance of virtual machines (Karthikeyan, 2018). The desired state
GRADUATE DIPLOMA IN ICT
Desired state configuration is therefore can be described as a declarative platform that is
mainly used for configuration, management and deployment of certain system. The three primary
concepts of DSC include configurations, resources and local configuration manager (Wilson,
2015). Configurations can be described a declarative power-shell scripts that defines and
configures the instances of the associated resources. The net component, which is the resources,
contains certain codes that help in keeping the target of a configuration in a specified state
(Herry, Anderson & Rovatsos, 2013). The local configuration manger on the other hand acts as
an engine that helps the DSC in facilitating the interaction between their resources and the
configuration of the resources.
The PowerShell desired state configuration is flexible enough to provide reliable and
consistent functions in each state of deployment life cycle. It can be seen that the desired state
configuration mainly centres around configurations, which is an easy to read document having
specific characteristics. One of the significant benefits of desired state configuration is that it
helps in making the deployment of specific sets of machines considerably less error prone
(Hermanns & Steffens, 2015). With desired state configuration, both on premise and off premise
deployments can be managed. The pull server associated with the desired state configuration is
used for centralizing the management of machines and their status reporting.
2.3. Importance of DSC for system Administrators
Working with desired state configuration can bring about certain advantages for the
system administrators. One of the major advantages is the easy deployment. This is possible
mainly because the desired state configuration is a versatile feature that enables consistent
deployment and maintenance of virtual machines (Karthikeyan, 2018). The desired state
9
GRADUATE DIPLOMA IN ICT
configuration is a great tool for providing a high level of automated management. With
PowerShell desired state configuration, system administrators can easily configure the multiple
virtual machines. However, for that accurate writing of the script is essential. With the
powershell desired state configuration, the system administrators can easily enable or disable the
individual windows server. The desired state configuration tool can further help the system
administrators in managing large scale environments. The configuration of a large number of
web servers is possible with the PowerShell desired state configuration. Thus it can be said that
the desired state configuration tool is extremely useful for server configuration, which helps the
system administrators in managing a large number of servers at a time. Furthermore with
PowerShell desired state configuration, automation of virtual machine deployment is possible,
which is advantageous for the system administrators as well.
2.4. Impact on Administrative Burden and Alternative Technology
The desired state configuration provides a number of advantages, out of which, the major
one being easier server configuration. This definitely reduces administrative burden as it is
extremely useful.
The PowerShell desired state configuration is a configuration management platform built
into windows. The desired state configuration provides enough flexibility and consistency in
each stage of deployment. However, there are certain alternative technologies that can be used
instead of PowerShell desired state configuration. One such technology is Ansible. Ansible is a
radically simple IT automation engine that is used for automation of cloud provisioning along
with configuration management. It is mainly designed for multi tier deployments. Ansible helps
in modeling the IT infrastructure as well apart from managing the same. With Ansible, the
GRADUATE DIPLOMA IN ICT
configuration is a great tool for providing a high level of automated management. With
PowerShell desired state configuration, system administrators can easily configure the multiple
virtual machines. However, for that accurate writing of the script is essential. With the
powershell desired state configuration, the system administrators can easily enable or disable the
individual windows server. The desired state configuration tool can further help the system
administrators in managing large scale environments. The configuration of a large number of
web servers is possible with the PowerShell desired state configuration. Thus it can be said that
the desired state configuration tool is extremely useful for server configuration, which helps the
system administrators in managing a large number of servers at a time. Furthermore with
PowerShell desired state configuration, automation of virtual machine deployment is possible,
which is advantageous for the system administrators as well.
2.4. Impact on Administrative Burden and Alternative Technology
The desired state configuration provides a number of advantages, out of which, the major
one being easier server configuration. This definitely reduces administrative burden as it is
extremely useful.
The PowerShell desired state configuration is a configuration management platform built
into windows. The desired state configuration provides enough flexibility and consistency in
each stage of deployment. However, there are certain alternative technologies that can be used
instead of PowerShell desired state configuration. One such technology is Ansible. Ansible is a
radically simple IT automation engine that is used for automation of cloud provisioning along
with configuration management. It is mainly designed for multi tier deployments. Ansible helps
in modeling the IT infrastructure as well apart from managing the same. With Ansible, the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10
GRADUATE DIPLOMA IN ICT
systems can be easily deployed as it makes use of simple language. Puppet is another alternative
to DSC (Bukowiec, Gaspar & Smith, 2017). Puppet is an automation solution that helps in
saving time, gaining visibility and ensures consistency of the IT infrastructure. Another
technology is Salt, which is a powerful and remote execution manager that administers and
provisions the servers in a fast and efficient manner. Salt allows the associated commands to be
executed over a large group of servers that helps in easier management of the systems.
Furthermore, it helps in quick introspection into the running systems. Another significant
alternative to PowerShell desired state configuration is Chef. It is an open source system
integration framework that helps in achieving similar results as that provided by Microsoft
PowerShell desired state configuration. With Chef, source code is written each part of the
infrastructure and later, those descriptions are used for configuration of the servers.
2.5. Conclusion
Desired state configuration is considered to be an essential part of configuration
management associated with the Windows based servers. PowerShell desired state configuration
helps in easier management of server configuration and proves to be a great tool for the system
administrators. It is associated with the PowerShell script that helps in easy configuration of the
servers. Along with the concept of desired state configuration, the importance of Microsoft
PowerShell desired state configuration is discussed in the report. The desired state configuration
provides a number of advantages, yet there are certain alternative solutions of technologies that
can help in achieving similar results. Those alternatives are discussed in the report as well.
GRADUATE DIPLOMA IN ICT
systems can be easily deployed as it makes use of simple language. Puppet is another alternative
to DSC (Bukowiec, Gaspar & Smith, 2017). Puppet is an automation solution that helps in
saving time, gaining visibility and ensures consistency of the IT infrastructure. Another
technology is Salt, which is a powerful and remote execution manager that administers and
provisions the servers in a fast and efficient manner. Salt allows the associated commands to be
executed over a large group of servers that helps in easier management of the systems.
Furthermore, it helps in quick introspection into the running systems. Another significant
alternative to PowerShell desired state configuration is Chef. It is an open source system
integration framework that helps in achieving similar results as that provided by Microsoft
PowerShell desired state configuration. With Chef, source code is written each part of the
infrastructure and later, those descriptions are used for configuration of the servers.
2.5. Conclusion
Desired state configuration is considered to be an essential part of configuration
management associated with the Windows based servers. PowerShell desired state configuration
helps in easier management of server configuration and proves to be a great tool for the system
administrators. It is associated with the PowerShell script that helps in easy configuration of the
servers. Along with the concept of desired state configuration, the importance of Microsoft
PowerShell desired state configuration is discussed in the report. The desired state configuration
provides a number of advantages, yet there are certain alternative solutions of technologies that
can help in achieving similar results. Those alternatives are discussed in the report as well.
11
GRADUATE DIPLOMA IN ICT
References
Adnan, A. H., Abdirazak, M., Sadi, A. S., Anam, T., Khan, S. Z., Rahman, M. M., & Omar, M.
M. (2015, December). A comparative study of WLAN security protocols: WPA, WPA2.
In Advances in Electrical Engineering (ICAEE), 2015 International Conference on (pp.
165-169). IEEE.
Bukowiec, S., Gaspar, R., & Smith, T. (2017, October). Windows Terminal Servers
Orchestration. In Journal of Physics: Conference Series (Vol. 898, No. 8, p. 082025).
IOP Publishing.
Bukowiec, S., Gaspar, R., & Smith, T. (2017, October). Windows Terminal Servers
Orchestration. In Journal of Physics: Conference Series (Vol. 898, No. 8, p. 082025).
IOP Publishing.
Cassola, A., Robertson, W. K., Kirda, E., & Noubir, G. (2013, February). A Practical, Targeted,
and Stealthy Attack Against WPA Enterprise Authentication. In NDSS.
Hermanns, J., & Steffens, A. (2015). The current state of ‘Infrastructure as Code’and how it
changes the software development process. Full-scale Software Engineering, 19.
Herry, H., Anderson, P., & Rovatsos, M. (2013, October). Choreographing configuration
changes. In Network and Service Management (CNSM), 2013 9th International
Conference on (pp. 156-160). IEEE.
Karthikeyan, S. A. (2018). Automated Provisioning and Performance Fine-Tuning. In Practical
Microsoft Azure IaaS(pp. 191-230). Apress, Berkeley, CA.
GRADUATE DIPLOMA IN ICT
References
Adnan, A. H., Abdirazak, M., Sadi, A. S., Anam, T., Khan, S. Z., Rahman, M. M., & Omar, M.
M. (2015, December). A comparative study of WLAN security protocols: WPA, WPA2.
In Advances in Electrical Engineering (ICAEE), 2015 International Conference on (pp.
165-169). IEEE.
Bukowiec, S., Gaspar, R., & Smith, T. (2017, October). Windows Terminal Servers
Orchestration. In Journal of Physics: Conference Series (Vol. 898, No. 8, p. 082025).
IOP Publishing.
Bukowiec, S., Gaspar, R., & Smith, T. (2017, October). Windows Terminal Servers
Orchestration. In Journal of Physics: Conference Series (Vol. 898, No. 8, p. 082025).
IOP Publishing.
Cassola, A., Robertson, W. K., Kirda, E., & Noubir, G. (2013, February). A Practical, Targeted,
and Stealthy Attack Against WPA Enterprise Authentication. In NDSS.
Hermanns, J., & Steffens, A. (2015). The current state of ‘Infrastructure as Code’and how it
changes the software development process. Full-scale Software Engineering, 19.
Herry, H., Anderson, P., & Rovatsos, M. (2013, October). Choreographing configuration
changes. In Network and Service Management (CNSM), 2013 9th International
Conference on (pp. 156-160). IEEE.
Karthikeyan, S. A. (2018). Automated Provisioning and Performance Fine-Tuning. In Practical
Microsoft Azure IaaS(pp. 191-230). Apress, Berkeley, CA.
12
GRADUATE DIPLOMA IN ICT
Khasawneh, M., Kajman, I., Alkhudaidy, R., & Althubyani, A. (2014, March). A survey on Wi-
Fi protocols: WPA and WPA2. In International Conference on Security in Computer
Networks and Distributed Systems (pp. 496-511). Springer, Berlin, Heidelberg.
Kumar, U., & Gambhir, S. (2014). A literature review of security threats to wireless
networks. International Journal of Future Generation Communication and
Networking, 7(4), 25-34.
Kurup, L., Shah, M. V., & Shah, D. (2014). Comparative Study of Attacks on Security
Protocols. Int. J. Adv. Res. Comput. Eng. Technol. IJARCET Univ. Mumbai India, 3(8).
Narayan, S., Jayawardena, C., Wang, J., & Ma, W. (2015, January). Performance test of IEEE
802.11 ac wireless devices. In Computer Communication and Informatics (ICCCI), 2015
International Conference on (pp. 1-6). IEEE.
Sari, A., & Karay, M. (2015). Comparative analysis of wireless security protocols: WEP vs
WPA. International Journal of Communications, Network and System Sciences, 8(12),
483.
Sharma, S., Mishra, R., & Singh, K. (2013, January). A review on wireless network security.
In International Conference on Heterogeneous Networking for Quality, Reliability,
Security and Robustness (pp. 668-681). Springer, Berlin, Heidelberg.
Vilius, K., Liu, L., Panneerselvam, J., & Stimpson, T. (2015, September). A critical analysis of
the efficiencies of emerging wireless security standards against network attacks.
In Intelligent Networking and Collaborative Systems (INCOS), 2015 International
Conference on (pp. 472-477). IEEE.
GRADUATE DIPLOMA IN ICT
Khasawneh, M., Kajman, I., Alkhudaidy, R., & Althubyani, A. (2014, March). A survey on Wi-
Fi protocols: WPA and WPA2. In International Conference on Security in Computer
Networks and Distributed Systems (pp. 496-511). Springer, Berlin, Heidelberg.
Kumar, U., & Gambhir, S. (2014). A literature review of security threats to wireless
networks. International Journal of Future Generation Communication and
Networking, 7(4), 25-34.
Kurup, L., Shah, M. V., & Shah, D. (2014). Comparative Study of Attacks on Security
Protocols. Int. J. Adv. Res. Comput. Eng. Technol. IJARCET Univ. Mumbai India, 3(8).
Narayan, S., Jayawardena, C., Wang, J., & Ma, W. (2015, January). Performance test of IEEE
802.11 ac wireless devices. In Computer Communication and Informatics (ICCCI), 2015
International Conference on (pp. 1-6). IEEE.
Sari, A., & Karay, M. (2015). Comparative analysis of wireless security protocols: WEP vs
WPA. International Journal of Communications, Network and System Sciences, 8(12),
483.
Sharma, S., Mishra, R., & Singh, K. (2013, January). A review on wireless network security.
In International Conference on Heterogeneous Networking for Quality, Reliability,
Security and Robustness (pp. 668-681). Springer, Berlin, Heidelberg.
Vilius, K., Liu, L., Panneerselvam, J., & Stimpson, T. (2015, September). A critical analysis of
the efficiencies of emerging wireless security standards against network attacks.
In Intelligent Networking and Collaborative Systems (INCOS), 2015 International
Conference on (pp. 472-477). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13
GRADUATE DIPLOMA IN ICT
Waliullah, M., Moniruzzaman, A. B. M., & Rahman, M. S. (2015). An experimental study
analysis of security attacks at IEEE 802.11 wireless local area network. International
Journal of Future Generation Communication and Networking, 8(1), 9-18.
Wilson, E. (2014). Windows PowerShell best practices. Pearson Education.
Wilson, E. (2015). Windows PowerShell Step by Step. Microsoft Press.
Zacker, C. (2014). Installing and Configuring Windows Server 2012 R2: Exam 70-410. Wiley.
GRADUATE DIPLOMA IN ICT
Waliullah, M., Moniruzzaman, A. B. M., & Rahman, M. S. (2015). An experimental study
analysis of security attacks at IEEE 802.11 wireless local area network. International
Journal of Future Generation Communication and Networking, 8(1), 9-18.
Wilson, E. (2014). Windows PowerShell best practices. Pearson Education.
Wilson, E. (2015). Windows PowerShell Step by Step. Microsoft Press.
Zacker, C. (2014). Installing and Configuring Windows Server 2012 R2: Exam 70-410. Wiley.
1 out of 14
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.