09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

communication such as sending and receiving emails, conducting mobile e-commerce<br />

transactions, and other data transmission which they expect will be kept as private as<br />

possible (Miller, 2001). The ongoing challenge <strong>of</strong> the WLAN development group is to<br />

ensure that those data will always be secured and private since hackers and intruders<br />

will not stop in finding ways to crack and attack the WLAN technology as well.<br />

WLANs are vulnerable to various security threats such as the man in the middle attack<br />

and also the denial <strong>of</strong> service attack. The security attacks discussed in this chapter is to<br />

provide a preliminary understanding on the various attacks that can be attempted on<br />

WLANs technology. The discussion on the 802.11 security issues provides an<br />

overview <strong>of</strong> the problems not just from technological perspective but also from the<br />

social perspective. The researches that have been completed to understand the actual<br />

situation and position <strong>of</strong> WLANs security awareness at several locations have provided<br />

valuable information regarding the state <strong>of</strong> WLANs security not just to other researchers<br />

but also to organizations residing in those affected area. The information gathered in<br />

the Lin et al. (2004) will be used to identify and compare the progress <strong>of</strong> WLANs<br />

security status in Auckland CBD between 2004 and 2007.<br />

The next chapter discusses the research methodology for this dissertation.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!