Title :
Vulnerability assessment in wireless networks
Author :
Henning, Ronda R.
Abstract :
Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.
Keywords :
business communication; computer network management; data privacy; message authentication; radio access networks; telecommunication security; authentication; confidentiality; enterprise network; incorrectly configured client identification; network vulnerability analysis; unauthorized wireless access point identification; vulnerability assessment; vulnerability scanning methodologies; wireless access points; wireless environment threats; wireless networks; Authentication; Computer interfaces; Computer networks; Intelligent networks; Legged locomotion; Mobile computing; Permission; Ubiquitous computing; Wireless application protocol; Wireless networks;
Conference_Titel :
Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on
Print_ISBN :
0-7695-1873-7
DOI :
10.1109/SAINTW.2003.1210186