Fleishman et al., 2009 - Google Patents
Take control of your wi-fi securityFleishman et al., 2009
- Document ID
- 17242022767011785832
- Author
- Fleishman G
- Engst A
- Publication year
External Links
Snippet
Learn how to keep intruders out of your wireless network and protect your sensitive communications! It's ten o'clock—do you know who's using your wireless network? If you haven't changed the default network name or admin password someone could be …
- 241000700605 Viruses 0 abstract description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0823—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thomas et al. | Network security first-step | |
Pande | Introduction to cyber security | |
Lackey | E-commerce systems security for small businesses | |
Sangster et al. | Network endpoint assessment (NEA): Overview and requirements | |
Chauhan | Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus | |
Wang et al. | Educational modules and research surveys on critical cybersecurity topics | |
Oriyano | Hacker techniques, tools, and incident handling | |
Souppaya et al. | User’s Guide to Telework and Bring Your Own Device (BYOD) Security | |
Kaushik et al. | A novel approach for an automated advanced MITM attack on IoT networks | |
Haber et al. | Attack vectors | |
Assing et al. | Mobile access safety: Beyond BYOD | |
Kumar et al. | Design and implementation of privacy and security system in social media | |
Androulidakis et al. | Industrial espionage and technical surveillance counter measurers | |
Dubrawsky | How to cheat at securing your network | |
Au et al. | Mobile security and privacy: Advances, challenges and future research directions | |
Singh et al. | CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260) | |
Wozak et al. | End-to-end security in telemedical networks–a practical guideline | |
Cekerevac et al. | SECURITY RISKS FROM THE MODERN MAN-IN-THE-MIDDLE ATTACKS. | |
Luvanda | Proposed framework for securing mobile banking applications from man in the middle attacks | |
Sheikh | CompTIA Security+ Certification Study Guide | |
Fleishman et al. | Take control of your wi-fi security | |
Granneman | Working from Home: A Hacker's Perspective | |
El Fiky | Wireless Penetration Testing: Up and Running | |
Cameron et al. | Juniper (r) Networks Secure Access SSL VPN Configuration Guide | |
Gibson | CISSP Rapid Review |