English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 47249/51115 (92%)
造訪人次 : 14205797      線上人數 : 715
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/21783


    題名: LINUX作業環境下無線網路攻擊與防禦之研究
    其他題名: Wireless Networking Attacks and Defense under Linux Operating Environment
    作者: 吳宗憲;蔡昌隆
    貢獻者: 工學院
    關鍵詞: 無線網路
    資訊安全
    駭客攻擊
    Linux作業系統
    Wireless networking
    Information Security
    Hacker's attack
    Linux OS
    日期: 2009-06-01
    上傳時間: 2012-03-21 14:50:32 (UTC+8)
    摘要: 隨著Linux作業系統設備的大量應用,網路駭客攻擊的對象已不再跼限於Windows作業環境,嗣因目前無線網路在多媒體資訊擷取與傳輸的蓬勃發展,雖資通領域的安全管控應用日益普及,然經無線傳輸資訊的監控系統,其資訊很容易遭到截取、破解帳密和竄改資訊內容,其安全性確實堪慮。尤其,在網路連結數位產品多元與多樣化,頻寬分享器亦具備多種功能,具備硬碟記憶功能的無線基地台已成無線網路通訊的儲存伺服器,是故不需啟動電腦即可提供外部檔案分享的相關服務,惟其帶來的便利性遠超過一般使用者對安全性的顧慮,已形成資訊安全的重大漏洞和隱憂。本論文特別針對現在運行的網路架構,在有線與無線網路的基礎設備上。以無線網路的安全性作為考量,進行網路安全性弱點攻擊,從攻擊的方式找尋防範對策,加強防護作為並同時確保資訊安全。

    Due to the huge application of facilities operated based on Linux OS, the Internet and network attacking is not limited to those systems that operate based on Windows OS only. Currently, the utilization of wireless networking for multimedia information access and transmission has significantly emerged. Although, there are a lot of information security provided. However, the information transmitted via wireless is easily intercepted, broken, and spoofed. Especially, the function, diversity and versatile of the developed wireless networking equipments increased more and more. Therefore, sharing the outside file service is not necessary to start the computer and the resources will be utilized without advanced permission in the following. The problem and induced impact of information security is really serious in the world. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, some protection strategies are proposed in this paper. The goal of this research is to establish a secure communication environment and provide information securing proposal for government, enterprises, research institutes, personal office, and those who perspective users to rescue from the disaster by fixing the leakage of information security.
    關聯: 華岡工程學報 24期 p.115 -122
    顯示於類別:[工學院] 學報-華岡工程學報

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML312檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©  2006-2025  - 回饋