LINUX-BASED LAYERED SECURITY FOR WIRELESS NETWORK

LINUX-BASED LAYERED SECURITY FOR WIRELESS NETWORK

Project Details

LINUX-BASED LAYERED SECURITY FOR WIRELESS NETWORK



Contact Chris Research

Description

ABSTRACT
Linux is the core or kernel of a free operating system first developed and released to the world by Linus Benedict Torvalds in 1991, for use on personal computers as an alternative to the heavy Unix. Millions of savvy computer users have been putting Linux to work for more than 10 years. Over the years many individuals, small office/home office (SOHO) users, businesses, corporations, colleges, non-profits, and local, state, and federal agencies in a number of countries have in corporate Linux with great success. And today, Linux is being incorporated into many IS/IT environments as part of improvements in efficiency, security and cost savings. This Enterprise version of Linux covers Fundamentals, System Administration, Network Administration: Focuses on security on wireless networks which this project is based on.
There are various Security challenges encountered with Linux some are the packet sniffers, the denial of service attacks. The techniques implemented to help solve the security issues are basically, a layered security, and also encryption for the wireless networks. With this implemented, it helps solve the problems of hackers if not 100% but 80% is solved, because you cannot fully secure a network, it has not been proved yet.
TABLE OF CONTENTS
Chapter One: Introduction
1.1 Background of the Study
1.2 Statement of the Problem
1.3 Aim and Objectives of the Study
1.4 Justification of the Research
1.5 Scope of the Study
1.6 Limitation of the Study
1.7 Methodology
1.8 Operational Definition of Terms
Chapter Two: Literature Review
2.1 Unix History
2.2 System Administration (an Overview of Linux System)
2.3 Major Services in a Unix System
2.4 Overview of a Directory Tree Background
2.5 Linux Network Devices
Chapter Three: The layered approach to security in Linux
3.1 Layered approach to information security
3.1.1 Physical security
3.1.2 System security
3.1.3 Network security
3.1.4 Application security
3.1.5 Perimeter security
3.1.6 Remote access and authentication
3.2 Layered Security Architecture
3.3 Firewall Security
3.3.1 Network Layer Firewall
3.3.2 Transport Layer Firewall
3.3.3 Application Layer Firewall
3.4 Remote Access and Authentication
3.5 The IP Security Protocol (IP Sec)
Chapter Four: Implementation
4.1 Implementing Linux Security
4.2 Encryption
4.2.1 Wired Equivalent Privacy
4.2.2 Wi-Fi Protected Access
4.2.3 WPA Encryption
4.3 Installing WPA Supplicant
4.4 Wireless Linux Security
4.5 Configuring Linux Wireless Security
Chapter Five: Summary, Conclusion and Recommendation
5.1 Summary
5.2 Conclusion
5.3 Recommendations
References

Leave a Reply

Your email address will not be published. Required fields are marked *