SE 4C03 Winter 2005
ثبت نشده
چکیده
The common trend in the new century has been for wireless computer networks to replace wired ones, due to increased mobility and greater convenience. Since the wireless network is simply broadcasting a signal, which anyone can connect to this Wireless Local Area Network (WLAN) and receive the signal with the proper equipment. Thus, these types of networks are fundamentally less secure than the traditional type. To help secure this type of wireless network, the standard security measure is Wired Equivalency Privacy (WEP). WEP aims to block any non-authorized eavesdroppers from accessing the WLAN connection. However there still exist many flaws in the current WEP technology which can be exploited, still leading to an insecure network vulnerable to potential attacks.
منابع مشابه
SE 4C03 Winter 2004
Imagine being able to break any classical encryption algorithm in a matter of seconds. Some would say that this statement is impossible, and it is in a classical sense. But with the advent of quantum computational theory, new methods of computation and algorithms are being developed that are making this statement more realistic. Quantum computation threatens classical encryption algorithms as i...
متن کاملSE 4C03 Winter 2004
Ensuring that p and q are very large prime numbers ensures the security of the system. Although multiplying large prime numbers is equivalent to multiplying any two large numbers, a trivial operation on a computer, its inverse is practically impossible. This operation is thus called a one-way function. This ensures that although one is given n, the product of the two prime numbers, discovering ...
متن کاملSE 4C03 Winter 2005
A DOS attack consists of rendering a network unable to carry legitimate user data. This can be done via attacking routers directly or by flooding the network with excessive traffic. Router attacks restrict the router’s ability to forward as many packets or its ability to forward them properly. This can be achieved by abusing known vulnerabilities to modify routing tables (using protocols such a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005