izpis_h1_title_alt

Varnost brezžičnih omrežij
JENKO, MARKO (Author), Ciglarič, Mojca (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,08 MB)
MD5: 8074534EDD8697FF63C6939B596A1723

Abstract
V diplomskem delu obravnavamo varnost, penetracijsko testiranje in različne tipe napadov na brezžična omrežja. Teoretično se seznanimo s področjem brezžičnih omrežij, varnostnimi mehanizmi in najbolj uporabljenimi varnostnimi standardi. V nadaljevanju sistematično pregledamo področje penetracijskega testiranja. Razdelimo penetracijsko testiranje na tipe in različne metodologije. Pojasnimo naloge izvajalca in naročnika penetracijskega testiranja. Opišemo potek izvajanja penetracijskega testiranja z metodologijo NIST na ciljnem sistemu in brezžičnem omrežju. Nato se osredotočimo na znane napade na brezžičnih omrežjih. Spoznamo ranljivosti, ki omogočajo njihovo izvajanje. Napade tudi praktično izvedemo na lastnih napravah.

Language:Slovenian
Keywords:brezžično omrežje, varnostni mehanizmi, penetracijsko testiranje, napadi na brezžična omrežja, varnost
Work type:Bachelor thesis/paper (mb11)
Organization:FRI - Faculty of computer and information science
Year:2016
Views:1528
Downloads:564
Metadata:XML RDF-CHPDL DC-XML DC-RDF
 
Average score:(0 votes)
Your score:Voting is allowed only to logged in users.
:
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Secondary language

Language:English
Title:Wireless Networks Security
Abstract:
In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the penetration testing is made using NIST methodology on the target system and wireless network. Then we focus our attention on known attacks on wireless networks. We learn about the theoretical part of security authentication and the vulnerabilities of wireless networks. The attacks are also practically executed on our own devices.

Keywords:wireless network, security mechanisms, penetration testing, wireless network attacks, security

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back