Sie sind auf Seite 1von 6

Wi-Fi Security: Protecting Insecure Channels

Outline:

1. Title page - Name, Capstone Project title, date, advisor and course
instructor.
2. Abstract - Concise description of principle accomplishments or results.
3. Copyright page
4. Introduction - Includes background (text the reader needs to know to
understand the research work), context (what has been done or is
currently being done by others, and how the student contribution fit
together with and contribute to previous efforts?), and motivation (why is
this research study important?).
5. Methodology — Description of the technical details of the student works
that has been reviewed by experts in the field.
6. Results and Discussion – Explanation of the data and observations gathered
in the research and their interpretation. This also includes the discussion
of the data, the significance and relation to a broader context. Results and
discussion sections can be put together or placed in separate paragraphs
as per the student choice.
7. Conclusions – Includes summary of the main conclusions of the research
work and possibly suggest future research directions.
8. References – Includes bibliographic references to existing literature
described in the introduction. The format of the reference section should
be that directed by the advisor.
9. Acknowledgements – To contributors and others.

The below are the references for Wi-Fi Security: Protecting Insecure Channels

project. The below references will help you to get start working on writing the project

of 30 pages.

1) Background

• http://www.sysdesign.ca/archive/networksecurity2009.pdf

• http://www.wlug.org/files/wifi-security.pdf

2) Methodology

Page 1 of 6
Wi-Fi Security: Protecting Insecure Channels

• http://books.google.ae/books?

id=eZ4cCsfaXyUC&pg=PA48&dq=advantages+and+disadvantages+Prima

ry+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&re

dir_esc=y#v=onepage&q=advantages%20and%20disadvantages

%20Primary%20Research%20method&f=false

• http://books.google.ae/books?

id=wY2bSaEm8l8C&pg=PA127&dq=advantages+and+disadvantages+Pri

mary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg

&redir_esc=y#v=onepage&q=advantages%20and%20disadvantages

%20Primary%20Research%20method&f=false

3) Findings

• http://mysbfiles.stonybrook.edu/~mlayer/cse102/HW3.html

• http://www.openitmag.com/2011/07/wi-fi-security/

• http://www.guardmyip.com/wifi-hotspot-security.html

• http://www.complexnetworks.fr/security-modes-of-wi-fi-access-points-in-

paris/

• http://fanaticmedia.com/infosecurity/archive/Feb10/5-Wireless-Security-

Threats_v2.htm

• http://infosecawareness.in/downloads/handbooks/wifi-security-ebook.pdf

Page 2 of 6
Wi-Fi Security: Protecting Insecure Channels

• http://java.uom.gr/~chalkias/e107_files/public/wifi-

security_FINAL_chalkias.pdf

• http://books.google.ae/books?

id=rLRgMdjwzxsC&pg=PA57&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf

• http://books.google.ae/books?

id=QuISwdREL1sC&pg=PT425&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://www.airtightnetworks.com/fileadmin/pdf/resources/WiFi_Security_Be

st_Practices.pdf

• http://books.google.ae/books?id=-

T7RRtAxRJ8C&pg=PA326&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://www.staysmartonline.gov.au/__data/assets/pdf_file/0004/19525/F17

_wi-fi_security.pdf

Page 3 of 6
Wi-Fi Security: Protecting Insecure Channels

• http://books.google.ae/books?

id=UDE_T26hBm4C&pg=PA413&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://cdn.ttgtmedia.com/rms/pdf/Manager%E2%80%99s%20Guide%20to

%20Wi-Fi%20security%20policies.pdf

• http://books.google.ae/books?

id=EATgHiGtCc4C&pg=PA26&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=mzkEAAAAMBAJ&pg=PA10&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=0RfANAwOUdIC&pg=PA92&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_

5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting

%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:

Page 4 of 6
Wi-Fi Security: Protecting Insecure Channels

+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-

Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A

%20Protecting%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=f24wFELSzkoC&pg=PA5&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-

Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A

%20Protecting%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-

Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A

%20Protecting%20insecure%20Channels&f=false

• http://books.google.ae/books?

id=VYlm5qzXUscC&pg=PA318&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=FAuAT__jI-

mg0QWj6ZWOBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A

%20Protecting%20insecure%20Channels&f=false

• http://books.google.ae/books?id=XI52je-

zaW8C&printsec=frontcover&dq=Wifi+Security:

+Protecting+insecure+Channels&hl=en&sa=X&ei=XguAT9_KDaSv0QWMi

Nj8Bg&redir_esc=y#v=onepage&q&f=false

• http://bcm-india.org/wifiBooklet.pdf

Page 5 of 6
Wi-Fi Security: Protecting Insecure Channels

• http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-

de_bouvette-farina.pdf

• http://csrc.nist.gov/archive/wireless/S02-Opening%20remarks-tg.pdf

Page 6 of 6

Das könnte Ihnen auch gefallen