Back close

Wireless Security Auditing: Attack Vectors and Mitigation Strategies

Publication Type : Journal Article

Publisher : Procedia Computer Science

Authors : Dr. M. Sethumadhavan, Ashok Kumar Mohan, and A, A. Devi

Campus : Coimbatore

School : School of Engineering

Center : TIFAC CORE in Cyber Security

Year : 2017

Abstract : Wireless security is concise on protecting the resources connected to the wireless network from unauthorized access. Wi-Fi Protected Access II (WPA2) is a predominant variety of cryptography based wireless security protocol, which is crafted to be robust and can prevent all the wireless attacks. But numerous organizations explicitly like educational institutions remains vulnerable due to lack of security. By auditing the vulnerabilities and performing the penetration testing, it is possible to review the causes of the issues indicted over the network. Wireless security auditing is anticipated to be an exact blend of attack scenario and the well matched audit policy checklist provides a benchmark for a sheltered wireless network in safe hands.

Admission open for 2021 Apply Now