Managing Security Risks in Wireless Networks

WiFiNetwork

References
[1] Houston, N., Reams, D., and Zelinsky, N. (N.D.) The Ethical Issues Surrounding Wi-Fi. Retrieved from http://ethicapublishing.com/ethical/3CH10.pdf
[2] Zaman, M., Ahmad, J., Azhar, M., Nawaz, A., Abbas, S., and Idrees, U. (2014). Implementation of Some Enhancements in Wireless Network Security by Finding Vulnerabilities, Threats, and Attacks. Journal of Global Innovations in Agricultural and Social Sciences. DOI: 10.17957/JGIASS/2.3.597
[3] Ijeh, A., Brimicombe, A., Preston, D., Imafidon, O. (2009). Security Measures in Wired and Wireless Networks. Retrieved from http://www.bcs.org/upload/pdf/ewic_iict09_s4paper2.pdf.
[4] Waliullah, Moniruzzaman, B.M., & Rahman, S. (2015). An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network. International Journal of Future Generation Communication and Networking Vol. 8, No. 1. Retrieved from http://www.sersc.org/journals/IJFGCN/vol8_no1/2.pdf
[5] Kumar, U., and Gamhir, S. (2014). A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking. Vol.7, No.4 (2014), pp.25-34 http://dx.doi.org/10.14257/ijfgcn.2014.7.4.03
[6] SANS (2014). Wireless Communication Policy. Consensus Policy Resource Community. Retrieved from https://www.sans.org/security-resources/policies/network-security/pdf/wireless-communication-policy
[7] Mandeville, S. (N.D.). Methodology: Security plan for wireless networks. Hackerville Scientific Research. Retrieved from https://www.exploit-db.com/docs/31170.pdf
[8] Cai, Y. (2014). Network Monitoring and Data Analysis in Wireless Networks. Retrieved from http://www.gc.cuny.edu/CUNY_GC/media/Computer-Science/Student%20Presentations/Yongje%20Cai/Yongjie_Cai_ThesisProposal.pdf
[9] Farrington, D. (2016). Enterprise Wireless Audit Checklist. Retrieved from https://www.sans.org/media/score/checklists/EnterpriseWirelessNetworkAudit.pdf
[10] Anderson, M. (2015). FitBit’s open Bluetooth port enables rapid ‘viral’ malware infection. The Stack. Retrieved from https://thestack.com/security/2015/10/21/fitbits-open-bluetooth-port-enables-rapid-viral-malware-infection/
[11] Author Unknown. (2016). Wireless Standards. RFiD Centre. Retrieved from http://www.rfidc.com/docs/introductiontowireless_standards.htm

Leave a Reply

Your email address will not be published. Required fields are marked *