Professional Documents
Culture Documents
SEMINAR REPORT
Submitted to the faculty of Engineering North Maharashtra University, Jalgaon. In partial fulfillment of requirements for the degree of
Bachelor of Engineering
In
Computer Engineering
TABLE OF CONTENTS
Wireless LAN Working Benefits of Wireless LANs Security of WLAN First-Generation Wireless LAN Security
VPN Technology
Authentication Security Threats
Ad Hoc
What is Ad Hoc? Use Of Ad Hoc
Security
The Need for Centralized . Security Management
SSID
WEP MAC address filtering
VPN Technology
For Secsetive data Takes Care of password & data transmission encryption
Authentication
Open Key
Shared Key
PAP/CHAP
One time password
Security Threats
Theft of Hardware
Conclusion (Recommendations)
Establish wireless LAN security policies and practices Design for security Logically separate internal networks Enable VPN access only Remove unnecessary protocols Restrict AP connections Protect wireless devices.
BIBLIOGRAPHY
Arunesh Mishra & Wiliam A. Arbaugh An initial security analysis of the IEEE 802.1X standard 6th Feb 2002
Lori Ayre Network security srcuring wireless network 13th Feb 2003