advisory

Anonymous
Wireless networks can be very convenient, providing Internet access at conferences, in coffee shops, motorway service stations, pubs and airports. However, some additional risks need to be considered before sending information ‘over the air’ as opposed to via fixed cables. For example:
Anonymous
A number of wireless LAN management systems have recently introduced functions that attempt to suppress rogue access points. Organisations considering using these should ensure that they are covered by their agreements with their users and their neighbours, otherwise their actions are likely to be highly unpopular and possibly even illegal.
Anonymous
Scott Armitage, Loughborough University October 2011 Wireless networks have become ubiquitous as a means of connecting to a network. It is unlikely that there are any remaining academic institutions in the UK which don’t offer some kind of wireless networking. However, many wireless network operators have little knowledge regarding the possible ways in which their wireless infrastructure can be attacked. This document briefly describes some of the common attacks which can be performed against IEEE 802.11 based networks.
Anonymous
This is the link to user authentication information: https://community.jisc.ac.uk/library/janet-policies/user-authentication
Anonymous
This information is at: https://community.jisc.ac.uk/library/janet-policies/guest-and-public-net...
Anonymous
See also: WPA2 vulnerability found (external link)
Anonymous
Geoff Constable, Hefin James and Ian Jones, University of Wales, Aberystwyth Contents Summary Introduction Background Service Requirements and Constraints Security Considerations and Solution Project Planning Equipment Test, Evaluation, Comparison and Selection Procurement
Anonymous
Geoff Constable, Hefin James and Ian Jones, University of Wales, Aberystwyth Contents Abstract Introduction Service Requirements and Constraints Feasibility Study / Site Survey / Cost Comparisons Project Planning Procurement Implementation
Anonymous
Dave Warley BSc(Hons) MIEE, Project Manager, IT Services, Northumbria University  Submitted in response to an open call for Wireless Networking Case Studies from the JANET Network Access Wireless Access Group 23 June 2004 Contents Abstract Introduction Service Requirements and Constraints Feasibility Study / Site Survey / Cost Comparisons Project Planning
Subscribe to advisory