Managing Security Risks in Wireless Networks

[1] Houston, N., Reams, D., and Zelinsky, N. (N.D.) The Ethical Issues Surrounding Wi-Fi. Retrieved from
[2] Zaman, M., Ahmad, J., Azhar, M., Nawaz, A., Abbas, S., and Idrees, U. (2014). Implementation of Some Enhancements in Wireless Network Security by Finding Vulnerabilities, Threats, and Attacks. Journal of Global Innovations in Agricultural and Social Sciences. DOI: 10.17957/JGIASS/2.3.597
[3] Ijeh, A., Brimicombe, A., Preston, D., Imafidon, O. (2009). Security Measures in Wired and Wireless Networks. Retrieved from
[4] Waliullah, Moniruzzaman, B.M., & Rahman, S. (2015). An Experimental Study Analysis of Security Attacks at IEEE 802.11 Wireless Local Area Network. International Journal of Future Generation Communication and Networking Vol. 8, No. 1. Retrieved from
[5] Kumar, U., and Gamhir, S. (2014). A Literature Review of Security Threats to Wireless Networks. International Journal of Future Generation Communication and Networking. Vol.7, No.4 (2014), pp.25-34
[6] SANS (2014). Wireless Communication Policy. Consensus Policy Resource Community. Retrieved from
[7] Mandeville, S. (N.D.). Methodology: Security plan for wireless networks. Hackerville Scientific Research. Retrieved from
[8] Cai, Y. (2014). Network Monitoring and Data Analysis in Wireless Networks. Retrieved from
[9] Farrington, D. (2016). Enterprise Wireless Audit Checklist. Retrieved from
[10] Anderson, M. (2015). FitBit’s open Bluetooth port enables rapid ‘viral’ malware infection. The Stack. Retrieved from
[11] Author Unknown. (2016). Wireless Standards. RFiD Centre. Retrieved from

One comment

Leave a Reply

Your email address will not be published. Required fields are marked *