LINUX – BASED LAYERED SECURITYFOR WIRELESS NETWORKS

LINUX – BASED LAYERED SECURITYFOR WIRELESS NETWORKS

Project Details

LINUX – BASED LAYERED SECURITYFOR WIRELESS NETWORKS


65 Pages, Chapter 1-5
MS Word

08062235854

Contact Chris Research

Description

Linux is the core or kernel of a free operating system first developed and released to the world by Linus Benedict Torvalds in 1991, for use on personal computers as an alternative to the heavy Unix. Millions of savvy computer users have been putting Linux to work for more than 10 years. Over the years many individuals, small office/home office (SOHO) users, businesses, corporations, colleges, non-profits, and local, state, and federal agencies in a number of countries have in corporate Linux with great success. And today, Linux is being incorporated into many IS/IT environments as part of improvements in efficiency, security and cost savings. This Enterprise version of Linux covers: 1. Fundamentals 2. System Administration 3. Network Administration: Focuses on security on wireless networks which this project is based on. There are various Security challenges encountered with Linux some are the packet sniffers, the denial of service attacks. The techniques implemented to help solve the security issues are basically, a layered security, and also encryption for the wireless networks. With this implemented, it helps solve the problems of hackers if not 100% but 80% is solved, because you cannot fully secure a network, it has not been proved yet.

TABLE OF CONTENTS

CHAPTER ONE: General Introduction

1.1       Background to the study

1.2       Problem Definition

1.3       Justification of the Research

1.4       Aims and Objectives

1.5       Scope of Research

1.6       Organization of Work

1.7       Definition of Terms

1.8       Conclusions about Findings

CHAPTER TWO: Literature Review

2.1       Introduction

2.2       Review of Existing Literature

2.3       Study of The Problem

2.4       Analysis of Problem or Existing system

2.5       Research Questions and Hypothesis

2.6       Conclusions

CHAPTER THREE: System Analysis and Design

3.1     System Requirement analysis

3.2     Design Methodology and Justification

3.3     System Design

3.4     Description of Systems

3.5     Conclusion

CHAPTER FOUR: Testing, Design and Implementation

4.1     Implementation Requirement

4.2     Programming Paradigm and Methodology

4.3     Description of Program modules

4.4     Description of Output

4.5     System Performance analysis

4.6Conclusions

CHAPTER FIVE: CONCLUSION

5.1    Introduction

5.2    Conclusion about each Research Question or Hypothesis

5.3    Conclusion about the Research problem

5.4       Implications for Theory

References

Amenities

Submit Your Review

Leave a Reply

Your email address will not be published. Required fields are marked *