Back close

Wireless Security Auditing: Attack Vectors and Mitigation Strategies

Publication Type : Journal Article

Publisher : Procedia Computer Science

Source : Procedia Computer Science, Elsevier, Volume 115, p.674–682 (2017)

Url : http://www.sciencedirect.com/science/article/pii/S1877050917319853

Keywords : Audit policies, Wireless security, Zero day attacks

Campus : Coimbatore

School : School of Engineering

Center : TIFAC CORE in Cyber Security

Department : Computer Science, Mathematics, cyber Security

Year : 2017

Abstract : Wireless security is concise on protecting the resources connected to the wireless network from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of cryptography based wireless security protocol, which is crafted to be robust and can prevent all the wireless attacks. But numerous organizations explicitly like educational institutions remains vulnerable due to lack of security. By auditing the vulnerabilities and performing the penetration testing, it is possible to review the causes of the issues indicted over the network. Wireless security auditing is anticipated to be an exact blend of attack scenario and the well matched audit policy checklist provides a benchmark for a sheltered wireless network in safe hands.

Cite this Research Publication : Ashok Kumar Mohan, Dr. M. Sethumadhavan, and A, A. Devi, “Wireless Security Auditing: Attack Vectors and Mitigation Strategies”, Procedia Computer Science, vol. 115, pp. 674–682, 2017.

Admissions Apply Now