(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Information Technology


" DoS attacks use a range of techniques and tricks to manipulate 802.11 protocols, with an eye to making it difficult or impossible for legitimate users to connect, or stay connected, to a Wi-Fi access point. In some cases, this simply means users might be unable to wirelessly update their Facebook page for awhile; in others, blocking access to email or other corporate resources; and in others blocking stock trades or other time-critical transactions that could cost companies a lot of money. " (Cox, 2011).
             The 802.11 standard itself contains numerous powerlessness imperfections. Despite the fact that the security features do give insurance to some degree, they are not completely inclined to assaults and can be hacked or controlled by the programmers. Here are the few known vulnerabilities of a 802.11 standard switch: the SSID is utilized for recognizing the system, not as a security measure. Unfortunately, the utilization of a SSID is frequently mixed up as a secret word assurance. The SSID contained in the signal edge is constantly sent in plaintext, paying little mind to the organization of the WEP choice. Any remote customer, malignant or not, can listen for this guide to acquire the SSID and detour this low level access control. (Dhull & Singh, 2010).
             Approximately 802.11 sellers offer a MAC Address ACL feature that gives insignificant access control by constraining access to just approved remote cards. Unfortunately, the bundles containing the MAC locations are sent in clear content and the sections on the ACL can be effortlessly gotten through movement observing. An unapproved client can parody these MAC delivers and attempt to get access to the AP. More often than not, the AP has the processing plant design for the executive username and password. At the point when the unapproved client has gotten to the AP, the arrangement of the AP can be changed.
             The Shared Key authentication mechanism is utilized before an affiliation is permitted.


Essays Related to Information Technology


Got a writing question? Ask our professional writer!
Submit My Question