Beruflich Dokumente
Kultur Dokumente
Outline:
1. Title page - Name, Capstone Project title, date, advisor and course
instructor.
2. Abstract - Concise description of principle accomplishments or results.
3. Copyright page
4. Introduction - Includes background (text the reader needs to know to
understand the research work), context (what has been done or is
currently being done by others, and how the student contribution fit
together with and contribute to previous efforts?), and motivation (why is
this research study important?).
5. Methodology — Description of the technical details of the student works
that has been reviewed by experts in the field.
6. Results and Discussion – Explanation of the data and observations gathered
in the research and their interpretation. This also includes the discussion
of the data, the significance and relation to a broader context. Results and
discussion sections can be put together or placed in separate paragraphs
as per the student choice.
7. Conclusions – Includes summary of the main conclusions of the research
work and possibly suggest future research directions.
8. References – Includes bibliographic references to existing literature
described in the introduction. The format of the reference section should
be that directed by the advisor.
9. Acknowledgements – To contributors and others.
The below are the references for Wi-Fi Security: Protecting Insecure Channels
project. The below references will help you to get start working on writing the project
of 30 pages.
1) Background
• http://www.sysdesign.ca/archive/networksecurity2009.pdf
• http://www.wlug.org/files/wifi-security.pdf
2) Methodology
Page 1 of 6
Wi-Fi Security: Protecting Insecure Channels
• http://books.google.ae/books?
id=eZ4cCsfaXyUC&pg=PA48&dq=advantages+and+disadvantages+Prima
ry+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg&re
dir_esc=y#v=onepage&q=advantages%20and%20disadvantages
%20Primary%20Research%20method&f=false
• http://books.google.ae/books?
id=wY2bSaEm8l8C&pg=PA127&dq=advantages+and+disadvantages+Pri
mary+Research+method&hl=en&sa=X&ei=qw2AT_ipDuOQ0AWWzsnpBg
&redir_esc=y#v=onepage&q=advantages%20and%20disadvantages
%20Primary%20Research%20method&f=false
3) Findings
• http://mysbfiles.stonybrook.edu/~mlayer/cse102/HW3.html
• http://www.openitmag.com/2011/07/wi-fi-security/
• http://www.guardmyip.com/wifi-hotspot-security.html
• http://www.complexnetworks.fr/security-modes-of-wi-fi-access-points-in-
paris/
• http://fanaticmedia.com/infosecurity/archive/Feb10/5-Wireless-Security-
Threats_v2.htm
• http://infosecawareness.in/downloads/handbooks/wifi-security-ebook.pdf
Page 2 of 6
Wi-Fi Security: Protecting Insecure Channels
• http://java.uom.gr/~chalkias/e107_files/public/wifi-
security_FINAL_chalkias.pdf
• http://books.google.ae/books?
id=rLRgMdjwzxsC&pg=PA57&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://www.hsc.fr/ressources/articles/hakin9_wifi/hakin9_wifi_EN.pdf
• http://books.google.ae/books?
id=QuISwdREL1sC&pg=PT425&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://www.airtightnetworks.com/fileadmin/pdf/resources/WiFi_Security_Be
st_Practices.pdf
• http://books.google.ae/books?id=-
T7RRtAxRJ8C&pg=PA326&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://www.staysmartonline.gov.au/__data/assets/pdf_file/0004/19525/F17
_wi-fi_security.pdf
Page 3 of 6
Wi-Fi Security: Protecting Insecure Channels
• http://books.google.ae/books?
id=UDE_T26hBm4C&pg=PA413&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://cdn.ttgtmedia.com/rms/pdf/Manager%E2%80%99s%20Guide%20to
%20Wi-Fi%20security%20policies.pdf
• http://books.google.ae/books?
id=EATgHiGtCc4C&pg=PA26&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=mzkEAAAAMBAJ&pg=PA10&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=0RfANAwOUdIC&pg=PA92&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=NQqAT466BYbI0QWZ_
5icBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A%20Protecting
%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:
Page 4 of 6
Wi-Fi Security: Protecting Insecure Channels
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=f24wFELSzkoC&pg=PA5&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=UE2wEc9NfB8C&pg=PA409&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=yAqAT_voD-
Gj0QXmytmFBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
• http://books.google.ae/books?
id=VYlm5qzXUscC&pg=PA318&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=FAuAT__jI-
mg0QWj6ZWOBw&redir_esc=y#v=onepage&q=Wifi%20Security%3A
%20Protecting%20insecure%20Channels&f=false
• http://books.google.ae/books?id=XI52je-
zaW8C&printsec=frontcover&dq=Wifi+Security:
+Protecting+insecure+Channels&hl=en&sa=X&ei=XguAT9_KDaSv0QWMi
Nj8Bg&redir_esc=y#v=onepage&q&f=false
• http://bcm-india.org/wifiBooklet.pdf
Page 5 of 6
Wi-Fi Security: Protecting Insecure Channels
• http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-
de_bouvette-farina.pdf
• http://csrc.nist.gov/archive/wireless/S02-Opening%20remarks-tg.pdf
Page 6 of 6