Wireless Hacking

Wireless Hacking

Shubh Gupta, Oroos Arshi, Ambika Aggarwal
Copyright: © 2023 |Pages: 31
ISBN13: 9781668482186|ISBN10: 1668482185|ISBN13 Softcover: 9781668482193|EISBN13: 9781668482209
DOI: 10.4018/978-1-6684-8218-6.ch016
Cite Chapter Cite Chapter

MLA

Gupta, Shubh, et al. "Wireless Hacking." Perspectives on Ethical Hacking and Penetration Testing, edited by Keshav Kaushik and Akashdeep Bhardwaj, IGI Global, 2023, pp. 382-412. https://doi.org/10.4018/978-1-6684-8218-6.ch016

APA

Gupta, S., Arshi, O., & Aggarwal, A. (2023). Wireless Hacking. In K. Kaushik & A. Bhardwaj (Eds.), Perspectives on Ethical Hacking and Penetration Testing (pp. 382-412). IGI Global. https://doi.org/10.4018/978-1-6684-8218-6.ch016

Chicago

Gupta, Shubh, Oroos Arshi, and Ambika Aggarwal. "Wireless Hacking." In Perspectives on Ethical Hacking and Penetration Testing, edited by Keshav Kaushik and Akashdeep Bhardwaj, 382-412. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8218-6.ch016

Export Reference

Mendeley
Favorite

Abstract

The network has become portable as a result of digital modulation, adaptive modulation, information compression, wireless access, and multiplexing. Wireless devices connected to the internet can possess a serious risk to the information security. These devices communicate among themselves in a public domain which is very easily susceptible to attacks. These devices only depend upon the encryption and their shared keys to help them mitigate the risk when data is in transit. Also WEP/WPA (wired equivalent privacy/ wireless protected access) cracking tools are taken care to avoid break into attacks. Several wireless networks, their security features, threats, and countermeasures to keep the network secure are all covered in this chapter. It analyses various wireless encryption techniques, highlighting their advantages and disadvantages. The chapter also explores wireless network attack techniques and provides countermeasures to safeguard the information systems and also provide a wireless penetration testing framework for safeguarding the wireless network.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.