[go: up one dir, main page]

Fleishman et al., 2009 - Google Patents

Take control of your wi-fi security

Fleishman et al., 2009

Document ID
17242022767011785832
Author
Fleishman G
Engst A
Publication year

External Links

Snippet

Learn how to keep intruders out of your wireless network and protect your sensitive communications! It's ten o'clock—do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0823Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles

Similar Documents

Publication Publication Date Title
Thomas et al. Network security first-step
Pande Introduction to cyber security
Lackey E-commerce systems security for small businesses
Sangster et al. Network endpoint assessment (NEA): Overview and requirements
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Wang et al. Educational modules and research surveys on critical cybersecurity topics
Oriyano Hacker techniques, tools, and incident handling
Souppaya et al. User’s Guide to Telework and Bring Your Own Device (BYOD) Security
Kaushik et al. A novel approach for an automated advanced MITM attack on IoT networks
Haber et al. Attack vectors
Assing et al. Mobile access safety: Beyond BYOD
Kumar et al. Design and implementation of privacy and security system in social media
Androulidakis et al. Industrial espionage and technical surveillance counter measurers
Dubrawsky How to cheat at securing your network
Au et al. Mobile security and privacy: Advances, challenges and future research directions
Singh et al. CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)
Wozak et al. End-to-end security in telemedical networks–a practical guideline
Cekerevac et al. SECURITY RISKS FROM THE MODERN MAN-IN-THE-MIDDLE ATTACKS.
Luvanda Proposed framework for securing mobile banking applications from man in the middle attacks
Sheikh CompTIA Security+ Certification Study Guide
Fleishman et al. Take control of your wi-fi security
Granneman Working from Home: A Hacker's Perspective
El Fiky Wireless Penetration Testing: Up and Running
Cameron et al. Juniper (r) Networks Secure Access SSL VPN Configuration Guide
Gibson CISSP Rapid Review