Useful Links
Computer Science
Cybersecurity
Cryptography and Network Security
1. Introduction to Security
2. Classical Encryption Techniques
3. Modern Symmetric Ciphers
4. Public-Key Cryptography and RSA
5. Cryptographic Hash Functions and Message Authentication
6. Digital Signatures and Authentication Protocols
7. Network Security Applications
8. Wireless Network Security
9. System and Infrastructure Security
10. Advanced and Emerging Topics
Wireless Network Security
Wireless Security Challenges
Open Medium Vulnerabilities
Broadcast Nature
Signal Propagation
Eavesdropping Risks
Passive Monitoring
Signal Interception
Rogue Access Points
Evil Twin Attacks
Unauthorized Access Points
Jamming Attacks
Signal Interference
Denial of Service
Physical Security Issues
Device Theft
Tampering
IEEE 802.11 Wireless LAN Security
802.11 Security Architecture
Security Services
Security Mechanisms
Wired Equivalent Privacy (WEP)
WEP Protocol
RC4 Stream Cipher
CRC-32 Integrity Check
WEP Key Management
Shared Keys
Key Distribution
Security Weaknesses
IV Reuse
Weak Keys
CRC Vulnerabilities
Key Recovery Attacks
Wi-Fi Protected Access (WPA)
WPA Protocol
802.1X Authentication
Dynamic Key Management
Temporal Key Integrity Protocol (TKIP)
Key Mixing
Message Integrity Check
Replay Protection
WPA Security Improvements
Stronger Authentication
Dynamic Keys
WPA2 and WPA3
WPA2 Protocol
AES Encryption
CCMP Protocol
Robust Security Network (RSN)
WPA3 Enhancements
Simultaneous Authentication of Equals (SAE)
Password-based Authentication
Forward Secrecy
Enhanced Open
192-bit Security Suite
WPA3 Security Features
Protection Against Offline Attacks
Forward Secrecy
Simplified Configuration
Robust Security Network (RSN)
RSN Architecture
Security Capabilities
Authentication Framework
Key Management
Pairwise Keys
Group Keys
Key Hierarchy
4-Way Handshake
Key Confirmation
Key Installation
Bluetooth Security
Bluetooth Security Architecture
Bluetooth Authentication
Bluetooth Encryption
Bluetooth Security Threats
Cellular Network Security
GSM Security
3G Security
4G LTE Security
5G Security
Previous
7. Network Security Applications
Go to top
Next
9. System and Infrastructure Security