IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 7, July 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Analysis Of Wireless Security

[Full Text]

 

AUTHOR(S)

Salendra Prasad

 

KEYWORDS

 

ABSTRACT

The WLAN security includes Wired Equivalent Primary (WEP) and WI-FI protected Access (WPA). Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

 

REFERENCES

[1]. B. Mitchell, "lifewire," 2016. [Online]. Available: https://www.lifewire.com/securing-a-wireless-computer-network-816537. [Accessed 20 April 2017].

[2]. ben, "whatismyipaddress," 2015. [Online]. Available: http://whatismyipaddress.com/wireless-security. [Accessed 2 April 2017].

[3]. T. Mangir, "Wireless Security," 2016. [Online]. Available: temangir@csulb.edu. [Accessed 2 April 2017].

[4]. Marco, "Blog," 2015. [Online]. Available: https://blog.marconet.com/blog/5-wireless-security-solutions-to-ease-your-mind. [Accessed 5 April 2017].

[5]. C. Ostlund, "Network Security," 2016. [Online]. Available: https://blog.marconet.com/blog/network-security-measures-protect-before-during-and-after-an-attack. [Accessed 2 April 2017].

[6]. Graham, "Wireless Security," 2006. [Online]. Available: http://rgjournals.com/index.php/ijwwc/article/view/329/154. [Accessed 6 April 2017].