• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

”Learning by doing är bäst av allt egentligen” : Nyare säkerhetsstandarder och kunskapsinhämtninginom trådlösa nätverk

Mulshine, Tim, Berkemar, Linus January 2023 (has links)
Då data som transporteras över trådlösa nätverk sänds genom luften i form av radiovågor är det viktigt att säkra upp nätverkskommunikationen med nya, erkändasäkerhetsstandarder. Däremot är användningsgraden av nyare säkerhetsstandarder inom Wi-Fi, specifikt WPA3 och PMF, låg. Samtidigt finns ett behov att öka förståelsen för relevanta metoder för kunskapsinhämtning. Syftet med studien är att ge rekommendationer för hur små och medelstora företag kan öka säkerheten i trådlösa nätverk. Studien identifierar orsaker till den låga användningsgraden av nyare säkerhetsstandarder i trådlösa nätverk och även hur nätverksadministratörer håller sig uppdaterade om standarderna. En kvalitativ ansats valdes för att besvara studiens syfte, vilket genomfördes med hjälp av 23 semi-strukturerade intervjuer med nätverksadministratörer i Sverige. Studiens resultat visar på ett tydligt tema där klientbasen i nätverken är huvudanledningen till avvaktandet med att implementera nyare säkerhetsstandarder, där kompabilitet upplevs som ett problem samtidigt som det råder okunskap om standarderna. Bland respondenterna anses metoden praktiskt laborerande vara mest effektiv för kunskapsinhämtning och fortbildning, ofta i samband med läsande av teori för att bilda en grundläggande förståelse. Studien landar i rekommendationer om de nyare säkerhetsstandarderna och kunskapsinhämtning riktade mot nätverksadministratörer, företag och även myndigheter och organisationer som bidrar med riktlinjer om trådlösa nätverk. / As data transmitted over wireless networks is sent through air, in the form of radio waves, it is important to secure network communication with new, recognized security standards. However, the adoption rate of newer security standards in Wi-Fi, specifically WPA3 and PMF, is low. At the same time, there is a need to increase understanding of relevant methods for knowledge acquisition. This study’s purpose is to provide recommendations on how small and medium-sized enterprises can increase the security of wireless networks. The study identifies reasons for the low adoption rate of newer security standards in wireless networks and how network administrators stay updated on the standards. A qualitative approach was chosen to address the study's purpose, which was conducted through 23 semi-structured interviews with network administrators in Sweden. The study's results reveal a clear theme where the client base in the networks is the main reason for reservations to implement newer security standards, with compatibility being perceived as a problem alongside a lack of knowledge about the standards. Among the respondents, practical experimentation is considered the most effective method for knowledge acquisition and continuous education, often combined with reading of theory to form a fundamental understanding. The study concludes with recommendations on the newer security standards and knowledge acquisition targeted towards network administrators, companies, as well as authorities and organizations that provide guidelines on wireless networks.
2

Aplikace pro Android na bezpečnostní monitorování komunikace / Android App for Security Monitoring of Communication

Klepáčková, Karolína January 2019 (has links)
This diploma thesis is focused on implementation of application for security monitoring of network communication of other applications in mobile device with Android platform. Provides users information about security risks that may harm his/her privacy or device. It uses a local VPN to tunnel all data sent to the wireless network. These can be linked to an application that has sent them because the Android kernel is derived from the Linux kernel and can be used to retrieve information about established network connections and the application identifier associated with the connection. This mapping allows to get more information about an app that is potentially dangerous for your mobile device.
3

Challenges of Wireless Security in the Healthcare Field : A study on the WPA3 standard

Mironov, Georgiana January 2020 (has links)
The healthcare environment is a complex one, saturated by wireless medical devices and sensitive patient data flowing through the network traffic. With the increased popularity of wireless medical devices in the healthcare domain together with the announcement of the new wireless security standard WPA3 comes a need to prepare for a new generation shift in wireless security. The goal of this study is therefore to investigate what challenges the healthcare sector can encounter when faced with the inevitable transition to WPA3. By performing a literature review on the security state of WPA3 compared to its predecessor and performing qualitative interviews with network technicians working in the healthcare sector, three major challenges were identified. IT professionals in the healthcare domain struggle with integrating legacy software systems, keeping middleware software solutions secure, and with handling hardware medical devices that come with outdated wireless standards. By analysing existing literature, several mitigating actions to battle these challenges were presented in this study.
4

A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

Almjamai, Sarmed January 2022 (has links)
The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. These security protocols are crucial in Wi-Fi networks with energy and memory-constrained devices because of adversaries that could breach confidentiality, integrity, and availability of networks through various attacks. Many research papers exist on single Wi-Fi attacks, and the strengths and weaknesses of security protocols and Wi-Fi standards. This thesis aims to provide a detailed overview of Wi-Fi attacks and corresponding mitigation techniques against IoT Wi-Fi networks in a comprehensive taxonomy. In addition tools are mentioned for each Wi-Fi attack that allows, e.g., professionals or network administrators to test the chosen Wi-Fi attacks against their IoT networks. Four types of attack (categories) were defined, Man-in-the-Middle (MitM), Key-recovery, Traffic Decryption, and Denial of Service (DoS) attacks. A set of Wi-Fi attack features were defined and decribed. The features included the security protocol and security mode, the layer (physical or data-link) that an attack targets, and the network component interaction required to allow a Wi-Fi attack to execute successfully. In total, 20 Wi-Fi attacks were selected with relevance to IoT in Wi-Fi networks based on some criteria. Additonally, each Wi-Fi attack consist of a description of possible consequences/results an adversary can achieve, such as eavesdropping, data theft, key recovery, and many more. Flow charts were also added to give the reader a visual perspective on how an attack works. As a result, tables were created for each relevant security protocol and the Open Systems Interconnection (OSI) layers to create a overview of mitigations and available tools for each attack. Furthermore, WPA3 was discussed on how it solves some shortcomings of WPA2 but has vulnerabilities of it own that lie in the design of the 4-way and dragonfly handshake itself. In conclusion, development and proper vulnerability tests on the Wi-Fi standards and security protocols have to be conducted to improve and reduce the possibility of current and upcoming vulnerabilities.

Page generated in 0.025 seconds