[go: up one dir, main page]

Gustafsson et al., 2007 - Google Patents

Security Risk Evaluation of the FON Network

Gustafsson et al., 2007

View PDF
Document ID
6879841570552283620
Author
Gustafsson J
Thor D
Publication year

External Links

Snippet

Hotspots are publicly available wireless access points to which any Wi-Fi enabled device can connect. Traditionally maintained by companies, hotspot services are now also being provided by individuals. The company FON enables this concept on a large scale by …
Continue reading at people.dsv.su.se (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/20Interfaces between hierarchically similar devices between access points
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components

Similar Documents

Publication Publication Date Title
US9935891B1 (en) Assessing a computing resource for compliance with a computing resource policy regime specification
Scarfone et al. Technical guide to information security testing and assessment
US20080047016A1 (en) CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations
US9264395B1 (en) Discovery engine
US9106661B1 (en) Computing resource policy regime specification and verification
Bakhshi Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors
US20080282338A1 (en) System and method for preventing the reception and transmission of malicious or objectionable content transmitted through a network
Cichonski et al. Computer security incident handling guide
Nthala et al. Rethinking home network security
Wright The IT regulatory and standards compliance handbook: How to survive information systems audit and assessments
Lustosa et al. Safety management applied to smart cities design
Amrin The impact of cyber security on SMEs
Scarfone et al. Sp 800-115. technical guide to information security testing and assessment
Gallaher et al. Cyber security: Economic strategies and public policy alternatives
Jackson Network security auditing
Osborne How to cheat at managing information security
Sailakshmi Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud
Toth et al. NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements
Treacy et al. Organizational cybersecurity post the pandemic: an exploration of remote working risks and mitigation strategies
Al-Hashimi et al. Evaluate information security governance frameworks in cloud computing environment using main and sub criteria
Kahraman Evaluating IT security performance with quantifiable metrics
Mana et al. Eurocontrol/Eatm-Cert Services-Supporting Aviation To Better Manage Cyber Threats
Modderkolk Zero trust maturity matters: Modeling cyber security focus areas and maturity levels in the zero trust principle
Gustafsson et al. Security Risk Evaluation of the FON Network
Saed et al. Data governance cloud security checklist at infrastructure as a service (IaaS)