Wireless network Risk Assessment Model and Application
Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. In this paper we had analyzed the risks mechanism of WLAN for network resources, and desi...
Saved in:
Main Author: | |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2014-06-01.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01956 am a22002653u 4500 | ||
---|---|---|---|
001 | ijeecs3551_1816 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Tang, JianGang |e author |
100 | 1 | 0 | |e contributor |
245 | 0 | 0 | |a Wireless network Risk Assessment Model and Application |
260 | |b Institute of Advanced Engineering and Science, |c 2014-06-01. | ||
520 | |a Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. In this paper we had analyzed the risks mechanism of WLAN for network resources, and designed an assessment model of security risk. When the incidents of network security which caused for vulnerability factors had been occurred, the model can be used to assess the consequences and impact on WLAN. The model achieves the network security early warning and control by scientific measurement and evaluation of the WLAN security risks. Wireless network security is not only with authentication, encryption, integrity testing and other technology-related, but also need intrusion detection systems, firewalls and other technology cooperation, so it's a multi-layered problem. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5446 | ||
540 | |a Copyright (c) 2014 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a eng | ||
690 | |||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 6: June 2014; 4639-4647 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v12.i6 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3551/1816 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3551/1816 |z Get fulltext |