Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Introduction
Chapter 1: A Summary of Guglielmo Marconi's History from Radio Waves to Modern Wi-Fi
History of Radio
The Onset of Space Telegraphy
The History of Wi-Fi
Development of Wi-Fi
Chapter 2: What is the Wi-Fi Alliance?
The Wi-Fi Alliance Mission
Wi-Fi Certification
Chapter 3: Wireless Security Protocols
Descriptions and differences WEP, WPA, and WPA2
Wi-Fi Protected Access (WPA)
Wi-Fi Protected Access 2 (WPA2)
Chapter 4: Threats and Vulnerabilities of a Wireless Network
Computer viruses
Spyware
Worms
Denial-of-service (DoS)
Man-in-the-middle Attacks
Ad hoc Networks
Non-traditional Networks
Rogue Security Software
Configuration Problems
Chapter 5: Information Security or Cybersecurity
Information security
Cybersecurity
Information Security vs Cybersecurity
Computer Security in Wireless Networks
The Cybersecurity Framework and Its Processes
The Framework Implementation Tiers
Chapter 6: The Various Modes/Types of Hacking Attacks
Difference between Active and Passive Attacks
Common Types of Information Security Hacking Attacks
Man-In-The-Middle Attack
Denial of Service Attack
Social-Engineering Attack
Buffer Overflow
Keylogging
Backdoor
Spoofing
Social Network Poisoning
Spyware
Chapter 7: Tools Used for Hacking
Kali Linux and Hacking Tools for the White Hat Hacker
Other Security Systems
Pentoo
Parrot Security OS
NST (Network Security Toolkit) System
Backbox
Chapter 8: Main Security Measures Against Hacking Attacks
Authentication System
User Management and Related Permissions
Mandatory Access Control (MAC)
Firewall
Intrusion Detection System
Network Intrusion Detection System
Honeypot
Conclusion
← Prev
Back
Next →
← Prev
Back
Next →