2019 2nd International Conference on Innovation in Engineering and Technology (ICIET) 2019
DOI: 10.1109/iciet48527.2019.9290589
|View full text |Cite
|
Sign up to set email alerts
|

A study of security awareness in Dhaka city using a portable WiFi pentesting device

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…ere is, however, a dearth of statistics on the inherent vulnerability and harm that underlie the use of WLAN. Hossain et al [43] describe a pilot study in a university context in which they examined the current scenario regarding its vulnerability to malicious attacks.…”
Section: Related Workmentioning
confidence: 99%
“…ere is, however, a dearth of statistics on the inherent vulnerability and harm that underlie the use of WLAN. Hossain et al [43] describe a pilot study in a university context in which they examined the current scenario regarding its vulnerability to malicious attacks.…”
Section: Related Workmentioning
confidence: 99%
“…These vulnerabilities are also motivated by the wireless nature of such networks [2]. A recent survey also recommended that, enterprises must use solutions to actively identify all devices on the wireless network as the threat of wireless network attacks grows every day [3]. In addition to these security issues, underlying security protocols used within WLANs, including Wired-Equivalent Privacy (WEP) and the different versions of the Wi-Fi Protected Access (WPA, WPA2 and WPA3) have had various security vulnerabilities that made some of the protocols completely obsolete.…”
Section: Introductionmentioning
confidence: 99%