logo

Wireless Technologies: Recent Exploits and Mitigation Strategies

   

Added on  2023-06-13

8 Pages1590 Words446 Views
Running head: WIRELESS TECHNOLOGIES
Wireless Technologies
Name of the Student
Name of the University
Author’s note:

2WIRELESS TECHNOLOGIES
Executive Summary
The wireless networks have an extremely common place in various offices and homes. They
play a major significant role in the society. This report discusses about the most recent and
common exploits to the security of the wireless networks. The major attacks that have
occurred recently have left a major impact on the security issues of the networks. This report
focusses on the attacks and the mitigation strategies of the attacks.

3WIRELESS TECHNOLOGIES
Table of Contents
1 Introduction.............................................................................................................................4
2 Brief Discussion on Wireless Technologies...........................................................................4
2.1 Recent Wireless Exploits.................................................................................................4
2.2 Impact of the Exploits......................................................................................................5
3 Recommendations to the Wireless Networks.........................................................................6
4 Conclusion...............................................................................................................................6
5 References...............................................................................................................................8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258

Security Issues in Wireless Protocols
|21
|4955
|66

Security Aspect of Wi-fi Technology: A Survey Paper Research Paper 2022
|5
|1183
|15

Understanding WPA, WEP, and WAP for Wi-Fi Security
|3
|693
|256

Assignment on Computer Network and Security
|6
|1343
|177

Wireless Security: WPA2-PSK vs VPN
|9
|1739
|418