1 / 17
文档名称:

(ebook) Wireless - Wireless Security and Monitoring for the work.pdf

格式:pdf   页数:17
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

(ebook) Wireless - Wireless Security and Monitoring for the work.pdf

上传人:bolee65 2014/7/18 文件大小:0 KB

下载得到文件列表

(ebook) Wireless - Wireless Security and Monitoring for the work.pdf

文档介绍

文档介绍:Wireless Security and Monitoring for the work
Raymond Turner
Version GIAC GSEC Practical Assignment
August 21, 2003

Abstract

Marketing trends estimate that by the end of 2006, 21 million homes will have
implemented a Local work (LAN), and of those 21 million homes 65%
will use wireless solutions. [1] The rapidly decreasing cost for wireless devices
and the proliferation of wireless solutions provided by the major Service
Providers seems to clearly support these growth estimates.
Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46
Home wireless users and security professionals the world over are conceptually
trying to solve similar problems. They both need to find a way to provide a secure
working environment. There are two distinct approaches to this security
dilemma, security prevention, and security detection. An example of security
prevention would be a firewall device that restricts specific traffic or ports to or
from specific hosts. Although this provides protection against unauthorized traffic,
it has no means for determining if an attack is being attempted via an authorized
port. An example of security detection would be an IDS (Intrusion Detection
System) device that contains a signature to identify a specific attack via
authorized or unauthorized ports. [2] Security professionals often have the
technology and resources to develop security solutions based on prevention,
detection, or bination of the two. However, home wireless users do not
have the luxury of evaluating their security approach since the guidelines and
wireless devices marketed to the home user demographic have an overwhelming
dependency on preventative mechanisms. The first part of this document will
briefly review the basic home access point security mechanisms, and their
weaknesses. The second part will cover the implementation of a script to detect,
identify, and provide notification of users on a home w

最近更新

一次性餐具健康安全建议书 6页

高考考生冲刺指南建议书 4页

高效采矿用地意见建议书 6页

高效行政管理岗位建设建议书 5页

高效节约型建议书 5页

高效绿化给水管网建议书 5页

高效土地规划建议书 6页

高中生生涯规划建议书 6页

高三备战策略建议书 5页

饭店菜品改进建议书 6页

食堂绿色改造建议书 5页

颜书记改进建议书 5页

领先亮化建议书 6页

干眼症患者的眼部热敷时长建议 40页

急性中毒的急救护理 27页

急诊危重症患者监护策略 42页

恐惧症患者的心理支持系统构建 63页

2024年湖北三峡职业技术学院马克思主义基本原.. 12页

2024年湖北职业技术学院马克思主义基本原理概.. 13页

2024年湖南师范大学树达学院马克思主义基本原.. 12页

2024年漳州科技职业学院马克思主义基本原理概.. 12页

2024年灵山县幼儿园教师招教考试备考题库及答.. 30页

2024年玉溪农业职业技术学院马克思主义基本原.. 12页

2024年甘肃农业职业技术学院马克思主义基本原.. 12页

2024年皖北卫生职业学院马克思主义基本原理概.. 12页

2024年石家庄学院马克思主义基本原理概论期末.. 12页

2024年祁东县幼儿园教师招教考试备考题库带答.. 30页

2024年福建警察学院马克思主义基本原理概论期.. 12页

2024年罗平县招教考试备考题库附答案解析 30页

2024年芜湖学院马克思主义基本原理概论期末考.. 12页