Wireless Local Area Network Security Protocols: Compliance with the IEEE 802.11i Standard
dc.contributor.author | Reilly, Robert | |
dc.date.accessioned | 2008-11-13T22:59:51Z | |
dc.date.available | 2008-11-13T22:59:51Z | |
dc.date.issued | 2005-06 | |
dc.description | vi, 81 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en |
dc.description.abstract | As Government regulations become more stringent, corporate responsibility to ensure data privacy increases. This study analyzes selected literature published between 1997 and 2005 to provide an analysis of wireless local area network security protocols based on compliance with criteria in the IEEE 802.lli standard. Capabilities, vulnerabilities and components are compared, to help IT executives form corporate security policy. Three protocols examined are Wired Equivalent Privacy, Wi-Fi Protected Access and Extensible Authentication Protocol-Transport Layer Security. | en |
dc.identifier.uri | https://hdl.handle.net/1794/7805 | |
dc.relation.ispartofseries | Aim Capstone 2005;Robert Reilly | |
dc.subject | Applied Information Management | en |
dc.subject | Data privacy | en |
dc.subject | Corporate security policy | en |
dc.subject | Wi-Fi | en |
dc.subject | Authentication protocol | en |
dc.subject | WLANs | en |
dc.subject | Wireless local area networks | en |
dc.subject | Protected access | en |
dc.subject | AIM | en |
dc.subject | Data | en |
dc.title | Wireless Local Area Network Security Protocols: Compliance with the IEEE 802.11i Standard | en |
dc.type | Other | en |