Back to Results
First PageMeta Content
Computer network security / IEEE 802.11 / Computing / Technology / Wi-Fi Protected Access / Wireless security / Extensible Authentication Protocol / Temporal Key Integrity Protocol / Wired Equivalent Privacy / Cryptography / Wireless networking / Cryptographic protocols


Wireless Security’s Future Bruce Potter Cigital, Inc[removed]Ridgetop Circle Suite 400
Add to Reading List

Document Date: 2013-11-26 20:44:05


Open Document

File Size: 265,04 KB

Share Result on Facebook

City

Seattle / New York / Washington / D.C. / EAP / Dulles / /

Company

Cigital Inc. / Avaya / Security’s Future Bruce Potter Cigital Inc. / Cisco / 11Mbps Wireless / CBC / Truth Wireless / /

/

Event

FDA Phase / /

Facility

Tunnel Authentication Protocols CBC / University of Maryland / /

IndustryTerm

Internet access / targeted wireless attacker / wireless encryption mechanism / port-based authentication protocol / mobile computing needs / symmetric encryption algorithm / authentication server / wireless clients / wireless security mechanisms / wireless industry organization / security protocol / link-layer data confidentiality / wireless network / wireless network security problems / back-end server / encryption hardware / Wireless Threats To / Wireless Responses To / high-tech corridor / Wireless network confidentiality / Wireless Terms / legacy wireless risks / targeted wireless network / wireless networks / encryption-processing hardware / wireless interfaces / given network / open wireless Internet access / wireless security protocols / Wireless Protected Access Copyright / secure solution / wireless client / internal auditing / community wireless networks / wireless networking / speed data networks / wireless security solution / wireless hosts / wireless network security / personal desktop wireless access point / wireless security standards / enterprise wireless network / port-based wireless client access control / open wireless network / cryptographic protocol / wireless infrastructure / Wireless Security / trustworthy networking platform / office networks / band-aid solution / rudimentary wireless security mechanisms / /

OperatingSystem

Mac OS X / Linux / FreeBSD / Windows XP / /

Organization

WiFi Alliance / University of Maryland / Extensible Authentication Protocol RADIUS / LAN-Jacking / Internet Engineering Task Force WEP / Internet Engineering Task Force / /

Person

Bruce Potter / Rogue / /

/

Position

senior software security consultant / /

Product

Ethernet / MD5 / /

ProvinceOrState

Virginia / Maryland / /

Region

northern Virginia / /

Technology

802.11 security protocol / LAN / Temporal Key Integrity Protocol / WEP / symmetric encryption algorithm / Linux / same symmetric encryption algorithm / PKI / MAC address / then using legacy WEP encryption / encryption / Ethernet / wireless access / Extensible Authentication Protocol / mobile computing / port-based authentication protocol / wireless security protocols / /

URL

www.missl.cs.umd.edu/wireless/1x.pdf / www.netstumbler.com / http /

SocialTag