196 research outputs found

    Wireless security proportional to county development

    Get PDF
    This paper verify the hypothesis developed counties have a higher wireless security level than undeveloped counties , this is performed by doing a quantitative study to a group of 50 samples gathered from a war drive database. In further sections of the paper will be explained the importance of wireless security and how companies like RSA have performed studies to determinate the wireless security level of several major cities around the world. By following the binomial test and median comparison, the reader will understand why in this paper the hypothesis was rejected. All the results indicate that no relation existed between the two variables, but the human behavior can be affected by many factors not only economical. Plenty of variables exist to study human behavior, for further studies others variables like education level can be considered to performed a study

    Design And Hardware Implementation Of A Novel Scrambling Security Algorithm For Robust Wireless Local Area Networks

    Get PDF
    The IEEE802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is a popular wireless secure communication stream cipher protocol approach to network security used to protect link-layer communications from eavesdropping and other attacks. It allows user to communicate with the user; sharing the public key over a network. It provides authentication and encrypted communications over unsecured channels. However, WEP protocol has an inherent security flaw. It is vulnerable to the various attacks, various experiments has proved that WEP fails to achieve its security goals. This thesis entails designing, evaluating and prototyping a wireless security infrastructure that can be used with the WEP protocol optionally, thus reducing the security vulnerabilities. We have studied the flaws of WEP and the reasons for their occurrence, and we provide the design and implementation of a novel scheme in Matlab and VHDL to improve the security of WEP in all aspects by a degree of 1000. The architecture was designed with a consideration for least increment in hardware, thus achieving power and cost efficiency. It also provides flexibility for optional implementation with the available technology by being able to be bypassed by the technology, which allows for non-replacement of existing hardware, common on both, the WEP and the proposed protocols, on the fly

    Alexa, is my home network safe?

    Get PDF
    This thesis was created to research the usability and ease of understanding of home network hardware, specifically routers. After the usability is researched, it will highlight the issues and insufficiency with informational documents from a layman’s understanding and the issues that arise when home networks are not properly secured. Most technical manuals that accompany networking hardware are not built for ease of understanding for someone with little technical knowledge in the field and should prioritize securing the hardware and user awareness. Additionally, this thesis aims to bring to light the concerning situation of responsibility post-breach in home networks, business networks, or data-holding providers. In most cases, whichever business has the breach should be held liable for compensation to those affected and initiate better security standards in the future

    Kill the Dinosaurs, and Other Tips for Achieving Technical Competence in Your Law Practice

    Get PDF
    It is a challenge to practice law in the digital age. This is particularly true when a practice involves significant e-Discovery, Intellectual Property, and technology law—areas in which technical issues merge with legal ones. One of the major challenges of bringing a law practice up to twenty-first-century standards relates to dinosaur thoughts, a.k.a. an “old ways are best” mentality

    IEEE 802.11 user fingerprinting and its applications for intrusion detection

    Get PDF
    AbstractEasy associations with wireless access points (APs) give users temporal and quick access to the Internet. It needs only a few seconds to take their machines to hotspots and do a little configuration in order to have Internet access. However, this portability becomes a double-edged sword for ignorant network users. Network protocol analyzers are typically developed for network performance analysis. Nonetheless, they can also be used to reveal user’s privacy by classifying network traffic. Some characteristics in IEEE 802.11 traffic particularly help identify users. Like actual human fingerprints, there are also unique traffic characteristics for each network user. They are called network user fingerprints, by tracking which more than half of network users can be connected to their traffic even with medium access control (MAC) layer pseudonyms. On the other hand, the concept of network user fingerprint is likely to be a powerful tool for intrusion detection and computer/digital forensics. As with actual criminal investigations, comparison of sampling data to training data may increase confidence in criminal specification. This article focuses on a survey on a user fingerprinting technique of IEEE 802.11 wireless LAN traffic. We also summarize some of the researches on IEEE 802.11 network characteristic analysis to figure out rogue APs and MAC protocol misbehaviors

    Usability and security support offered through ADSL router user manuals

    Get PDF
    ADSL routers are often used as either the target or the means for cyber crime. Many ADSL router threats could be mitigated through the effective use of inbuilt security controls and firmware updates available from vendors. Unfortunately, end‐users typically lack the technical expertise to correctly configure and secure the device. Subsequently, end‐users are reliant on well documented procedures provided by vendors in their user manuals and quick start guides. This study investigates the usability and security recommendations and encouragements put forth by vendors in their user manuals. The study demonstrates that user manual usability does not conform to ideal technical publication practices. In addition, end‐users are typically not encouraged to utilise the in‐built security features and in a few instances are actually deterred from securing their ADSL router

    Usability and Security Support Offered Through ADSL Router User Manuals

    Get PDF
    ADSL routers are often used as either the target or the means for cyber crime. Many ADSL router threats could be mitigated through the effective use of inbuilt security controls and firmware updates available from vendors. Unfortunately, end‐users typically lack the technical expertise to correctly configure and secure the device. Subsequently, end‐users are reliant on well documented procedures provided by vendors in their user manuals and quick start guides. This study investigates the usability and security recommendations and encouragements put forth by vendors in their user manuals. The study demonstrates that user manual usability does not conform to ideal technical publication practices. In addition, end‐users are typically not encouraged to utilise the in‐built security features and in a few instances are actually deterred from securing their ADSL router

    Auditing the data confidentiality of wireless local area networks

    Get PDF
    Wireless Local Area Networks (WLANs) provide many significant advantages to the contemporary business enterprise. WLANs also provide considerable security challenges for network administrators and users. Data confidentiality breaches (ie, unauthorized access to data) are the major security vulnerability within WLANs. To date, the major IT security standards from the International Standards Organisation (the ISO/IEC 17799) and the National Institute of Science and Technology (the Special Publication or SP suite) have only a superficial coverage of WLAN security controls and compliance certification strategies. The clear responsibility for WLAN managers is to provide network users with best practice security strategies to mitigate the real risk of unauthorized data access. The clear responsibility for IT auditors is to ensure that best practice security practices are in place and that operational compliance is consistently achieved. This paper describes a newly researched software auditing artifact for the evaluation of the data confidentiality levels of WLAN transmissions – and therefore by extension for the evaluation of existing security controls to mitigate the risk of WLAN confidentiality breaches. The paper describes how the software auditing artifact has been evolved via a design science research methodology, and pivots upon the real time passive sampling of data packets as they are transmitted between mobile users and mobile transmission access points. The paper describes how the software auditing artifact uses these sampled data packets to produce a very detailed evaluation of the levels of data confidentiality in effect across the WLAN. This detailed evaluation includes specific identification (for network managers) of the types of software services operating across the WLAN that are not supported with the appropriate data confidentiality controls. The paper concludes by presenting an analysis of the results achieved during beta testing of the auditing artifact within a university production WLAN environment

    Does your wireless LAN have criminal intent?

    Get PDF
    All of the literature relating to wireless network security has focused on the flaws, newer alternatives and suggestions for securing the network. There is much speculation and anecdotal statements in relation to what can happen if a breach occurs, but this is mostly from a computer security perspective, and mostly expressed in terms of potential for financial loss. This paper examines the potential legal ramifications of failing to properly secure a wireless network. Several scenarios are examined within based on usage of wireless on the various category of attack. Legal opinion, backed up with case law, is provided for each scenario. Several examples are given for unauthorised use, with other aspects having potential for prosecution. The conclusion is that no matter whether you are a home user of wireless, a small to medium business or a large enterprise, there a legal as well as financial reasons to properly secure your wireless network
    • 

    corecore