Publication Type : Journal Article
Publisher : Procedia Computer Science
Source : Procedia Computer Science, Elsevier, Volume 115, p.674–682 (2017)
Url : http://www.sciencedirect.com/science/article/pii/S1877050917319853
Keywords : Audit policies, Wireless security, Zero day attacks
Campus : Coimbatore
School : School of Engineering
Center : TIFAC CORE in Cyber Security
Department : Computer Science, cyber Security, Mathematics
Year : 2017
Abstract : Wireless security is concise on protecting the resources connected to the wireless network from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of cryptography based wireless security protocol, which is crafted to be robust and can prevent all the wireless attacks. But numerous organizations explicitly like educational institutions remains vulnerable due to lack of security. By auditing the vulnerabilities and performing the penetration testing, it is possible to review the causes of the issues indicted over the network. Wireless security auditing is anticipated to be an exact blend of attack scenario and the well matched audit policy checklist provides a benchmark for a sheltered wireless network in safe hands.
Cite this Research Publication : Ashok Kumar Mohan, Dr. M. Sethumadhavan, and A, A. Devi, “Wireless Security Auditing: Attack Vectors and Mitigation Strategies”, Procedia Computer Science, vol. 115, pp. 674–682, 2017.