Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations

@inproceedings{Woodward2005RecommendationsFW,
  title={Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations},
  author={Andrew Woodward},
  booktitle={AISM},
  year={2005}
}
Since their inception, 802.11 wireless networks have been plagued by a wide range of security problems. These problems relate to both data security and denial of service attacks, and there have been many solutions created by different vendors address these problems. However, the number of different types of attack, and the many possible solutions, makes it a difficult task to put in place an appropriate wireless network security policy. Such a policy must address both the size and nature of the… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

A field guide to wireless LAN’s for administrators and power users

  • T. Maufer
  • 2004
Highly Influential
3 Excerpts

An analysis of current 802.11 wireless network layer one and two attacks and possible preventative measures

  • A. Woodward
  • Journal of Information Warfare
  • 2004
2 Excerpts

Electromagnetic (EM) threats to information security – Applicability of the EMC directive and information security guidelines

  • R. Hoad, A. Jones
  • European conference on Information Warfare and…
  • 2004
1 Excerpt

Real 802.11 security: Wi-Fi protected access and 802.11i

  • J. Edney, W. A. Arbaugh
  • 2004
2 Excerpts

WITS – Wireless Intrusion Tracking System

  • C. Valli
  • European conference on Information Warfare and…
  • 2004
1 Excerpt

Wireless Jacks - An analysis of 802.11 wireless denial of service attacks and hijacks

  • A. Woodward
  • European conference on Information Warfare and…
  • 2004
2 Excerpts

Disassociation and De-auth attack

  • J. Bellardo, S. Savage
  • USENIX Security Symposium, USENIX. Coursey, D
  • 2003
1 Excerpt

The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards

  • S. Wong
  • 2003
1 Excerpt

Similar Papers

Loading similar papers…