Tuesday, February 18, 2020

Information security in wireless local area networks Essay

Information security in wireless local area networks - Essay Example Man in the Middle (MitM) is a real information security concern for the Wireless Local Area Networks. In the MitM attack, address of the proxy server changes with any fake address and hacks the wireless network in the form of traffic tunnelling, proxy attack, DNS poisoning, and rout mangling. This paper also outlined the solution of the major information security issues through the development of the techniques and protocols. Alloy model is the core focus in this paper, which contains the written code. Execution of this code is verified whether it met the expected function. Development of these techniques and protocols is aimed to ensure the data integrity and security. C# is the core programming language for the client side and PHP programming is used for the server side. Model checking involved the testing of the written features of the application in terms of verification of the descriptions. Static analysis, deductive verification, dynamic analysis and software model checking are the best examples of technology, which use the theorem proving for the validity of verification. Information Security in Wireless Local Area Networks Summary and Conclusion Introductory chapter of thesis narrates the aims and objectives of the work, and describes the structure of the thesis. This early chapter is focused on the Wireless Local Area Networks (WLAN), which is the biggest segment in the Wireless products’ market. Wireless Local Area Networks facilitates the communication and computing in spatial domains including the enterprises, hospitals, offices and campuses. In these environments, WLAN expands and complements the coverage in the existing networks. There are three main objectives behind the information security for the wireless networks such as the data integrity, confidentiality, and availability. Data Integrity; It is ensured that no data or information has been modified. Confidentiality; It is ensured that nobody other than receiver can see or read the inf ormation. Availability; It ensures the availability of information needed at any time. The second chapter of this thesis work has been on the history and background of the study. This chapter describes the ways of the wireless detection using when data packets pass through the Network Interface Card (NIC). Managed and â€Å"rfmon† modes of data transferring through NIC are stated. The function of the Kismet has been specified when data packets pass through the NIC and saved in the file named as â€Å"pcap†. Beacon frame is most wanted for the sniffer that contains the information about sniffing operation. Data sending and receiving over the WLANs need the connection with Access Points. The requirements of the encryption protocol for the data encryption of the beacon frame are also realized in this part of the thesis. A hacker attacks the wireless network and selects a wireless channel from where it attacks the network. Hacker uses the two probing techniques such as act ive and passive. NetStumbler tools works as active probing and receives the Service Set Identifies (SSID) and host information. An active probe detects the access points in scope of hackers’ transmission. Passive Probing technique is used to drop the data packets over a channel and neither data receiver nor the data sender can detect the attacker’s presence. Surveillance is a passive technique that a hacker uses to capture the data traffic over a

Monday, February 3, 2020

The Five Agreements And how it has Impact in my life Essay

The Five Agreements And how it has Impact in my life - Essay Example Perceptually, this has changed my life in many ways considering the implications and literal translations of the words impeccable in your words. With this in mind, it has made me accountable for every word I utter in that there is no one to take responsibility for nay word said out of context or one that is uttered irresponsibly. As a result, this has taught me to be a person who only follows what I believe in and state that which I understand beyond reasonable doubt, and not that which I think. This has influenced to being a truthful person as there is no way I can state that which I do not know, the same way I can utter words without factual backing. However, this is not to mean that I have not been subject to issuing my own opinion on certain things and issues. Personally, truth does not refer to sticking to the facts, but also telling exactly what I feel and believe, which is a part of my belief system, as inculcated by the being impeccable in my word. Through adopting this stanc e, my opinion does not dig into other people’s privacy and rights, as well as beyond their comfort zones. Being personal is one of the reasons why the world is facing astronomical figures in terms of depressed persons that need professional help. This is what brings us to the second agreement, which is that of not taking everything or anything personally, which has affected my life profoundly. It may not be to the extent that I would like it to be so that I do not end up condemning other people for having done things that offend me. However, as a person I believe my life could not be better without this part of the agreements as it has assisted me in ridding my life of most forms of perceiving people as being fundamentally malicious. Therefore, this implies that before my encounter with the book highlighting these truths, it made everything seem to revolve around my life. As a result, everything was done towards or against me, which is one of the severe forms of