Analysis information security threats network standard IEEE 802.11
DOI:
https://doi.org/10.18372/2410-7840.17.9786Keywords:
computer network, IEEE 802.11, Wi-Fi, threats to information security, information securityAbstract
Nowadays wireless technologies are constantly evolving and penetrate the social life, gradually replacing the wire. Easy to use, lower cost of installation – are the main advantages of wireless systems. The technology of standard IEEE 802.11, also known as Wi-Fi is today's most popular wireless technology. The number of users increases daily. However, information security data in this technology, first, inferior protection systems wired networks because of the existence of threats features wireless networks, and secondly insufficiently researched and tested. So the problem identification and analysis of threats to information security network standard IEEE 802.11 is relevant today. By analyzing threats we relied on foreign research scientists and practitioners companies in this area involved in the study of development threats and prevent them. Researches of the issue makes it possible to identify and classify potential threats and, subsequently, upgrade existing or develop new effective methods and measures against threats to information security.References
Концепція технічного захисту інформації в галузі зв’язку України. [Електронний ресурс]. – Режим доступу: http://zakon5.rada.gov.ua/laws/show/ 1126–97–%D0%BF
Корченко А.Г. Анализ и определение понятия риска для его интерпретации в области информационной безопасности / Корченко А.Г., Иванченко Е.В., Казмирчук С.В. // Защита информации – 2010. – №3.
Корченко О. Г. Системи захисту інформації [Текст] : Монографія / О. Г. Корченко. — К. : НАУ, 2004. – 264 с.
Практическая атака на беспроводную сеть с WEP шифрованием [Електронний ресурс] // Хабра-хабр. – 2010. – Режим доступу до ресурсу: http://habrahabr.ru/post/92681/
Cost of Data Breach Study [Електронний ре-сурс] // Ponemon Institute. – 2015. – Режим доступу до ресурсу: http://www–03.ibm.com/ security/infographics/data–breach/#scene2.
IBM 2015 Cyber Security Intelligence Index [Електронний ресурс] // IBM corporation. – 2015. – Режим доступу до ресурсу: http://pub-lic.dhe.ibm.com/common/ssi/ecm/se/en/ sew03073usen/SEW03073USEN.PDF
It security risks survey 2014: a business approach to managing data security threats [Електронний ресурс] // KasperskyLab. – 2014. – Режим доступу до ресу-рсу: http://media.kaspersky.com/en/ it_security_risks_survey_2014_global_report.pdf.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).