DocumentCode :
1619153
Title :
Vulnerability assessment in wireless networks
Author :
Henning, Ronda R.
fYear :
2003
Firstpage :
358
Lastpage :
362
Abstract :
Wireless access points bring great convenience to the enterprise network, and also bring a large collection of vulnerabilities into the enterprise environment. Wireless users pose new difficulties in authentication and confidentiality that can intentionally or inadvertently pose a threat to their wired colleagues. A comprehensive network vulnerability analysis must address wireless environment threats and vulnerabilities, including identification of unauthorized Wireless Access Points and incorrectly configured clients. This paper discusses the issues associated with vulnerability assessment in a wireless network and a recommended approach to integrating wireless devices into vulnerability scanning methodologies.
Keywords :
business communication; computer network management; data privacy; message authentication; radio access networks; telecommunication security; authentication; confidentiality; enterprise network; incorrectly configured client identification; network vulnerability analysis; unauthorized wireless access point identification; vulnerability assessment; vulnerability scanning methodologies; wireless access points; wireless environment threats; wireless networks; Authentication; Computer interfaces; Computer networks; Intelligent networks; Legged locomotion; Mobile computing; Permission; Ubiquitous computing; Wireless application protocol; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on
Print_ISBN :
0-7695-1873-7
Type :
conf
DOI :
10.1109/SAINTW.2003.1210186
Filename :
1210186
Link To Document :
بازگشت