Design of effectively efficient techniques for circumvent wireless network security threats and attacks

dc.contributor.authorKule, Titus
dc.contributor.authorBakwanamaha, Allan
dc.date.accessioned2019-11-09T08:11:28Z
dc.date.available2019-11-09T08:11:28Z
dc.date.issued2016-08
dc.descriptionA report submitted to Kampala International University in partial fulfillment of the requirement for the award of the Degree of Bachelor of Science in Computer Engineering en_US
dc.description.abstractThe rapid increase in computer, mobile applications and wireless networks has globally changed the features of network security. A series of Internet attack and fraudulent acts on companies and individual network have shown us that open computer networks have no immunity from intrusions. The traditional way of protecting computer networks, such as firewalls and software encryption are insufficient and ineffective. The wireless ad-hoc network is susceptible to physical attack or harm due to its feature of open medium dynamic changing topology, monitoring and management point not being centralized, clear line not well defended and cooperative algorithms. Since the techniques developed on fixed wired networks to detect intruders have been rendered inapplicable in this new environment, the need for ways and methods to develop new architecture and mechanisms to protect mobile computing applications and wireless networks is important. This project research looks into vulnerabilities and effective, efficient technique for circumventing wireless networks. Many problems small companies are facing due to intruders and attackers are also discussed. Basically, the vulnerabilities and circumventing this project research examines will be very useful in the underdeveloped and developing nations.  en_US
dc.identifier.urihttp://hdl.handle.net/20.500.12306/2309
dc.language.isoenen_US
dc.publisherKampala International University ,School of Engineering and Applied Sciences,Department of Computer Engineeringen_US
dc.subjectMobile Applicationsen_US
dc.subjectWireless Networksen_US
dc.subjectNetwork Securityen_US
dc.titleDesign of effectively efficient techniques for circumvent wireless network security threats and attacksen_US
dc.typeOtheren_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
DESIGN OF EFFECTIVELY EFFICIENT TECHNIQUES FOR CIRCUMVENT WIRELESS NETWORK SECURITY THREATS AND ATTACKS.pdf
Size:
686.17 KB
Format:
Adobe Portable Document Format
Description:
Full text
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: