Capítulo de livro

Wireless Hacking

2023; IGI Global; Linguagem: Inglês

10.4018/978-1-6684-8218-6.ch016

ISSN

1948-9749

Autores

Shubh Gupta, Oroos Arshi, Ambika Aggarwal,

Tópico(s)

Internet Traffic Analysis and Secure E-voting

Resumo

The network has become portable as a result of digital modulation, adaptive modulation, information compression, wireless access, and multiplexing. Wireless devices connected to the internet can possess a serious risk to the information security. These devices communicate among themselves in a public domain which is very easily susceptible to attacks. These devices only depend upon the encryption and their shared keys to help them mitigate the risk when data is in transit. Also WEP/WPA (wired equivalent privacy/ wireless protected access) cracking tools are taken care to avoid break into attacks. Several wireless networks, their security features, threats, and countermeasures to keep the network secure are all covered in this chapter. It analyses various wireless encryption techniques, highlighting their advantages and disadvantages. The chapter also explores wireless network attack techniques and provides countermeasures to safeguard the information systems and also provide a wireless penetration testing framework for safeguarding the wireless network.

Referência(s)