Wireless Network Security – How Secure Is It?

6104 words 25 pages
WIRELESS NETWORK SECURITY – HOW SECURE IS IT?

by

Chris Bradley

ITT Technical Institute Information Systems Security student

November 23, 2010

Dr. French:

This report on “Wireless Network Security” is submitted in accordance with your assignment for November 23, 2010.

Sincerely,

Chris Bradley

ABSTRACT
For this project, I asked the question “is wireless network protection truly safe?” My literature search led me to conclude that, if consumers use the most up-to-date and secure wireless network protection, they can connect to their wireless network and conduct business safely and confidently.

TABLE OF CONTENTS
Title Page ----------------------------------------------- i
Letter of Transmittal
…show more content…
American Library Association. (2005). Wireless network configuration and security strategies. Retrieved
September 21, 2010, from http://web.ebscohost.com.proxy.itt-tech.edu/ehost/detail?vid=1&hid=111&sid=d467e3be-c81c-4a03-97e3-03ef864b3725%40sessionmgr111&bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=f5h&AN=18501151.

APPENDIX A
BIBLIOGRAPHY
Google search:
Wi-Fi protected access. Retrieved on September 21, 2010, from http://en.wikipedia.org/wiki/Wi- Fi_Protected_Access.
WPA Wireless Security for Home Networks. Retrieved on September
21, 2010, from http://www.microsoft.com/windowsxp/using/networking/expert/bowman_03july28.mspx.
Wired Equivalent Privacy. Retrieved on September 21, 2010, from http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy.
WEP Concepts and Vulnerability. Retrieved on September 21,2010, from http://www.wi-fiplanet.com/tutorials/article.php/1368661/80211-WEP-Concepts-and-Vulnerability.htm.
(In)Security of the WEP algorithm. Retrieved on September 21, 2010, from http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.
10 Tips for wireless home network security. Retrieved on September 21, 2010, from http://compnetworking.about.com/od/wirelesssecurity /tp/wifisecurity.htm.
Securing your wireless network. Retrieved on September 21, 2010, from

Related

  • Healthcare It Security and Cloud Computing
    2587 words | 11 pages
  • Internal Network Security
    1476 words | 6 pages
  • Network Topologies
    1024 words | 5 pages
  • Security Weaknesses of Quality Web Design and Recomendations
    1341 words | 6 pages
  • The Byod Security Risk
    1173 words | 5 pages
  • IS3220 Project Network Design Chris Wig
    1202 words | 5 pages
  • Riordan Proposal Network and Data Upgrade
    4606 words | 19 pages
  • CMIT 320 Network Security Paper Elizabeth Flaim
    974 words | 4 pages
  • Planning a Wireless Network Lan
    2311 words | 10 pages
  • Campus Area Wireless Network Proposal
    2014 words | 9 pages