izpis_h1_title_alt

Varnost brezžičnih omrežij
ID JENKO, MARKO (Author), ID Ciglarič, Mojca (Mentor) More about this mentor... This link opens in a new window

.pdfPDF - Presentation file, Download (1,08 MB)
MD5: 8074534EDD8697FF63C6939B596A1723
PID: 20.500.12556/rul/82c25a92-3e4d-4cc6-a581-f1729e44ef8f

Abstract
V diplomskem delu obravnavamo varnost, penetracijsko testiranje in različne tipe napadov na brezžična omrežja. Teoretično se seznanimo s področjem brezžičnih omrežij, varnostnimi mehanizmi in najbolj uporabljenimi varnostnimi standardi. V nadaljevanju sistematično pregledamo področje penetracijskega testiranja. Razdelimo penetracijsko testiranje na tipe in različne metodologije. Pojasnimo naloge izvajalca in naročnika penetracijskega testiranja. Opišemo potek izvajanja penetracijskega testiranja z metodologijo NIST na ciljnem sistemu in brezžičnem omrežju. Nato se osredotočimo na znane napade na brezžičnih omrežjih. Spoznamo ranljivosti, ki omogočajo njihovo izvajanje. Napade tudi praktično izvedemo na lastnih napravah.

Language:Slovenian
Keywords:brezžično omrežje, varnostni mehanizmi, penetracijsko testiranje, napadi na brezžična omrežja, varnost
Work type:Bachelor thesis/paper
Organization:FRI - Faculty of Computer and Information Science
Year:2016
PID:20.500.12556/RUL-86408 This link opens in a new window
Publication date in RUL:13.10.2016
Views:2311
Downloads:653
Metadata:XML RDF-CHPDL DC-XML DC-RDF
:
Copy citation
Share:Bookmark and Share

Secondary language

Language:English
Title:Wireless Networks Security
Abstract:
In this thesis we deal with security, penetration testing and different types of attacks on wireless networks. We theoretically familiarize with the field of wireless networks, security mechanisms and the most used security standards. Then we systematically overview the field of penetration testing. We divide the penetration testing on types and different methodologies. We explain the tasks of the provider and the subscriber in penetration testing. Description of the process of conducting the penetration testing is made using NIST methodology on the target system and wireless network. Then we focus our attention on known attacks on wireless networks. We learn about the theoretical part of security authentication and the vulnerabilities of wireless networks. The attacks are also practically executed on our own devices.

Keywords:wireless network, security mechanisms, penetration testing, wireless network attacks, security

Similar documents

Similar works from RUL:
Similar works from other Slovenian collections:

Back