دانلود رایگان مقاله انگلیسی حسابرسی امنیتی بی سیم: مسیر های حمله - الزویر 2017

عنوان فارسی
حسابرسی امنیتی بی سیم: مسیر های حمله و استراتژی های کاهش دهنده آن
عنوان انگلیسی
Wireless Security Auditing: Attack Vectors and Mitigation Strategies
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
9
سال انتشار
2017
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6808
رشته های مرتبط با این مقاله
حسابداری
گرایش های مرتبط با این مقاله
حسابرسی
مجله
پروسه علوم کامپیوتر - Procedia Computer Science
دانشگاه
Amrita School of Engineering - Amrita Vishwa Vidyapeetham
کلمات کلیدی
امنیت بی سیم؛ حملات صفر؛ سیاست های حسابرسی
۰.۰ (بدون امتیاز)
امتیاز دهید
چکیده

Abstract


Wireless security is concise on protecting the resources connected to the wireless network from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of cryptography based wireless security protocol, which is crafted to be robust and can prevent all the wireless attacks. But numerous organizations explicitly like educational institutions remains vulnerable due to lack of security. By auditing the vulnerabilities and performing the penetration testing, it is possible to review the causes of the issues indicted over the network. Wireless security auditing is anticipated to be an exact blend of attack scenario and the well matched audit policy checklist provides a benchmark for a sheltered wireless network in safe hands.

نتیجه گیری

6. Conclusion


The way this audit policies are implemented is fairly simple and if all the audits are passed every time, the wireless network infrastructure is proven secure. This means wireless audit policies are used to regulate the integrity of the Wi-Fi enabled networks. So the future audits can aim at automating and updating old policies, adding new policies, reviewing based upon user behaviour and other zero day attacks. It paves way for a huge chance that the attacks do not work on a network anymore or they are caught red-handed and proper disciplinary actions taken by the authorities concern. However, if an attack works within the audit team and most of them are compromised, then the state of affairs need to be handled and audit policies have to be redrafted based upon the infection mode of the individual entities.


بدون دیدگاه