AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
AIS300 - Scheme of Work - Scholarly Commons Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
communication such as sending and receiving emails, conducting mobile e-commerce<br />
transactions, and other data transmission which they expect will be kept as private as<br />
possible (Miller, 2001). The ongoing challenge <strong>of</strong> the WLAN development group is to<br />
ensure that those data will always be secured and private since hackers and intruders<br />
will not stop in finding ways to crack and attack the WLAN technology as well.<br />
WLANs are vulnerable to various security threats such as the man in the middle attack<br />
and also the denial <strong>of</strong> service attack. The security attacks discussed in this chapter is to<br />
provide a preliminary understanding on the various attacks that can be attempted on<br />
WLANs technology. The discussion on the 802.11 security issues provides an<br />
overview <strong>of</strong> the problems not just from technological perspective but also from the<br />
social perspective. The researches that have been completed to understand the actual<br />
situation and position <strong>of</strong> WLANs security awareness at several locations have provided<br />
valuable information regarding the state <strong>of</strong> WLANs security not just to other researchers<br />
but also to organizations residing in those affected area. The information gathered in<br />
the Lin et al. (2004) will be used to identify and compare the progress <strong>of</strong> WLANs<br />
security status in Auckland CBD between 2004 and 2007.<br />
The next chapter discusses the research methodology for this dissertation.<br />
20