{"title":"确保无线局域网(WLAN)安全的实用指南","authors":"Ahmed Khan, Aaliya Sarfaraz","doi":"10.14257/IJSIA.2018.12.3.03","DOIUrl":null,"url":null,"abstract":"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Practical Guidelines for Securing Wireless Local Area Networks (WLANs)\",\"authors\":\"Ahmed Khan, Aaliya Sarfaraz\",\"doi\":\"10.14257/IJSIA.2018.12.3.03\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2018.12.3.03\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2018.12.3.03","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Practical Guidelines for Securing Wireless Local Area Networks (WLANs)
The publication generally focuses on the security configuration and monitoring of wireless local area networks (WLANs) which are extensively being used by various organizations. Wireless Local Area Networks (WLANs) presents an exceptional challenge for the different organizations that are using Wireless Local Area Networks [1]. Over the years, the percentage of attacks on Wireless Local Area Networks has been increased, which as a result has compelled the organizations and users of WLAN to rethink about their WLAN security. The publication is a way forward for improving the standards of security and monitoring of the wireless local area networks (WLANs) and the devices which connect to those networks by giving pertinent recommendations. The article is really helpful for all those who are associated with the planning, implementation, maintenance and monitoring of the security of the wireless local area networks of a particular organization and all the devices that are connected to these WLAN like network professionals, security professionals, system administrators and all other entities related with the security of an organization’s network. The scope of the publication is restricted to wireless networks that are unclassified and also the unclassified facilities that fall within range of such wireless networks.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security