Library items tagged: advisory

Anonymous
Scott Armitage, Loughborough University 14 July 2011 Introduction Wireless networks can be affected both passively and actively by the environment in which they operate due to the fact that they use a radio frequency (RF) medium for data transfer.
Anonymous
Wireless networking is virtually synonymous with the deployment of equipment supporting one or more of the 802.11 family of standards. These have experienced a period of rapid growth of use in recent years, and the problems and caveats associated with networking to these standards are well documented. Essentially 802.11 can be viewed as a technology to both supplement and extend the traditional wired local area network (LAN).
Anonymous
Anonymous
Scott Armitage, Loughborough University 23 July 2010
Anonymous
Wireless LAN Security
Anonymous
Two significant factors in the security of any network are the measures that exist to ensure accountability for and privacy of traffic: in other words, to control the ability to send packets to the network and to read packets from the network. Different networks have different characteristics. For example:
Anonymous
Wireless networks can be very convenient, providing Internet access at conferences, in coffee shops, motorway service stations, pubs and airports. However, some additional risks need to be considered before sending information ‘over the air’ as opposed to via fixed cables. For example:
Anonymous
A number of wireless LAN management systems have recently introduced functions that attempt to suppress rogue access points. Organisations considering using these should ensure that they are covered by their agreements with their users and their neighbours, otherwise their actions are likely to be highly unpopular and possibly even illegal.
Anonymous
Scott Armitage, Loughborough University October 2011 Wireless networks have become ubiquitous as a means of connecting to a network. It is unlikely that there are any remaining academic institutions in the UK which don’t offer some kind of wireless networking. However, many wireless network operators have little knowledge regarding the possible ways in which their wireless infrastructure can be attacked. This document briefly describes some of the common attacks which can be performed against IEEE 802.11 based networks.
Anonymous
This is the link to user authentication information: https://community.jisc.ac.uk/library/janet-policies/user-authentication