Please refer to references and outline attached to prepare paper accordingly. please add more references min is 10.
- Prepare a report on your approved topic from Week 2 with a minimum of 2000 words, no less, but more is acceptable.
- References (10 minimum). You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and any other publicly-reviewed source are not accepted)
- The paper must have a title page, reference list and be in APA format. The information within your title page and reference list will not count towards the minimum word count.
- The paper will be subjected to checking against plagiarism. The paper must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed)
- Correct spelling and grammar.
- APA formatting: Title page, in paragraph citations, and the Reference list. Please do single space
- At a minimum include the following:
- Detailed description of the area researched
- Technology involved
- Future trends
- Global implications
- Introduction
- Basic information about the topic, reason why I chose it to be interesting to reader.
- Thesis Statement: Attacks on the wireless network can take many forms and can portray itself as a tool for the user, but attacks will unfortunately cause more harm and invade a person privacy.
- Topic Sentence 1: Discussing the 6 types of Wireless Network Attacks
- Explain each type of attack and provide an example (WEP/WPA attacks,War Driving, Jamming, Password Theft, Rouge Access Point and Packet Sniffing)
- Inform of personal experience
- Topic Sentence 2: Threats the Users will experience
- What the criminal are after
- Why criminals attack the wireless network for personal gain
- Topic sentence 3:Ways to prevent and detect the Attacks
- What to look for if you suspect a certain attack.
- Explain steps that can be done to prevent or become more knowledgeable to protect yourself.
- Conclusion
- Summary of types of threats on Wireless Networks
- Expanding on the thesis and finding a resolution.
References
Aziz, I., Yadav, S., & Aziz, I. (2013). Data Encapsulation To Prevent Jamming Attacks In Wireless Networks. International Journal of Computer Technology and Applications, 4(6), 976–976. Retrieved from http://search.proquest.com/docview/1513476424/
Cache, J., Wright, J., & Liu, V. (2010). Hacking exposed, wireless wireless security secrets & solutions (2nd ed.). New York: McGraw-Hill
Bucholtz, C. (1997). Jamming the hackers. Telephony, 232(26), 94. Retrieved from http://search.proquest.com/docview/213970792/
Time to come clean about hacking. (2005). IT Week, 10. Retrieved from http://search.proquest.com/docview/213599744/
Hurley, C. (2007). WarDriving& wireless penetration testing. Rockland, MA: Syngress.
PLACE THE ORDER WITH US TODAY AND GET A PERFECT SCORE!!!