Font Size: a A A

Data Secure Regarding Usage Of Wireless System

Posted on:2011-08-02Degree:MasterType:Thesis
Institution:UniversityCandidate:Sroy AboutyFull Text:PDF
GTID:2178360308968636Subject:Computer Science
Abstract/Summary:PDF Full Text Request
Wireless communication system is gaining popularity as they are fast, cost effective, flexible and easy to use. However, they are faced with some serious security challenges and the choice of security protocol is a critical issue for IT administrators. Meanwhile the technology is the fastest growing up-to-date security has become a very active interest lately for schools, universities and enterprise. Many have been stunned and even overwhelmed with the waves of virus and worm attacks sweeping through their networks. Sometimes older network equipment cannot handle the volume and kind of traffic these nasty send in their attempts to spread. Users have the ability to transfer large files, access the Web and other high bandwidth activities without having the need to attach network cables to ports that are connected to switches or hubs. They have the freedom to roam around anywhere within the range of the wireless network. So, it has been estimated that the IEEE 802.11 standard is susceptible to attacks both on data content and user authentication, such as Eavesdropping, Spoofing and Denial of Service. Thus, the wireless networking security has recently become more and more popular due to its convenience and falling prices of the hardware.This thesis has explored how an intrusion detection system can aid in detecting threats towards a wireless communication. Given the inherent problems that exist in wireless conversations regarding eavesdropping and badly implemented security, is it possible to secure a wireless network from eavesdropping? The answer is yes, it is possible to secure on the wireless system from eavesdropping, but other attacks directed towards wireless products can be detected in most cases. Furthermore, the purpose of thesis setup a wireless system utilizing such as,802.1x, Virtual Private Network, Security Socket Layer, Cisco LEAP. And all the security service like a confidentiality above that I mentioned can be gave a tight security for wireless network system, and the IPSec was improving to supports two encryption modes, Transport and Tune. So, that all users must use strong encryption to guarantee the highest level of security to beyond threats. Thus, all types of network activity would be protected.
Keywords/Search Tags:Data, Secure, Wireless System, LAN
PDF Full Text Request
Related items