International Journal of Computer Science & Engineering Technology

ISSN : 2229-3345

Open Access
Open Access

ABSTRACT

Title : A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Authors : Mr.S.Manimaran, S.Kaviya, S.Josphin Anitha, S.Meiyappan
Keywords : Cryptography; Intrusion; Hacking; Spoofing; Encryption; Information Security; Sniffing
Issue Date : September 2015
Abstract :
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the programmers who unethically make use of our personal information, they may steal it and use for some unwanted purpose. They are greatly motivated by a massive amount of profit, challenge, strong efforts, to assist in performing illegal activities. All hackers do not follow a same technique to perform illegal tasks. It will vary depending upon the security of information and the depth of the content involved in it. There are a large number of hacking techniques available in wireless networks. In this theoretical analysis, the systematic methodology of various techniques that the hacker follows to attack a machine or sensitive information of the users has been scrutinized.
Page(s) : 575-579
ISSN : 2229-3345
Source : Vol. 6, Issue.9

Copyright © 2010-2024 IJCSET KEJA Publications