Pages
47
Words
14,409
Chapters
5
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
LINUX-BASED LAYERED SECURITY FOR WIRELESS NETWORK
Categories
Table of contents
Chapter One: Introduction 1
1.1 Background of the Study 1
1.2 Statement of the Problem 2
1.3 Aim and Objectives of the Study 2
1.4 Justification of the Research 3
1.5 Scope of the Study 3
1.6 Limitation of the Study 3
1.7 Methodology 3
1.8 Operational Definition of Terms 3
Chapter Two: Literature Review 5
2.1 Unix History 5
2.2 System Administration (an Overview of Linux System) 9
2.3 Major Services in a Unix System 10
2.4 Overview of a Directory Tree Background 14
2.5 Linux Network Devices 16
Chapter Three: The layered approach to security in Linux 20
3.1 Layered approach to information security 20
3.1.1 Physical security 21
3.1.2 System security 21
3.1.3 Network security 21
3.1.4 Application security 22
3.1.5 Perimeter security 23
3.1.6 Remote access and authentication 24
3.2 Layered Security Architecture 24
3.3 Firewall Security 25
3.3.1 Network Layer Firewall 25
3.3.2 Transport Layer Firewall 28
3.3.3 Application Layer Firewall 28
3.4 Remote Access and Authentication 29
3.5 The IP Security Protocol (IP Sec) 30
Chapter Four: Implementation 31
4.1 Implementing Linux Security 31
4.2 Encryption 34
4.2.1 Wired Equivalent Privacy 34
4.2.2 Wi-Fi Protected Access 34
4.2.3 WPA Encryption 35
4.3 Installing WPA Supplicant 35
4.4 Wireless Linux Security 38
4.5 Configuring Linux Wireless Security 39
Chapter Five: Summary, Conclusion and Recommendation 43
5.1 Summary 43
5.2 Conclusion 43
5.3 Recommendations 44
References 45
LIST OF FIGURE
FIGURE TITLE PAGE
2−1 some of the more important parts of the Linux kernel 10
2−2 Parts of a UNIX directory tree. Dashed lines indicate partition limits. 15
3-1 Layered Security Architecture 25
3-2 Single Homed Dial up Server 26
3-3 Dual Homed Firewall 27
3-4 Tripple Homed Dialup Server 27
3-5 FWTK Architecture 29
3-6 Proxy Fire Wall 29
4-1 Redhat-config-network Main Screen 40
4-2 Wireless Configuration Screen 41
4-3 Wireless Settings Screen 42
Abstract
Linux is the core or kernel of a free operating system first developed and released to the world by Linus Benedict Torvalds in 1991, for use on personal computers as an alternative to the heavy Unix. Millions of savvy computer users have been putting Linux to work for more than 10 years. Over the years many individuals, small office/home office (SOHO) users, businesses, corporations, colleges, non-profits, and local, state, and federal agencies in a number of countries have in corporate Linux with great success. And today, Linux is being incorporated into many IS/IT environments as part of improvements in efficiency, security and cost savings. This Enterprise version of Linux covers Fundamentals, System Administration, Network Administration: Focuses on security on wireless networks which this project is based on.
There are various Security challenges encountered with Linux some are the packet sniffers, the denial of service attacks. The techniques implemented to help solve the security issues are basically, a layered security, and also encryption for the wireless networks. With this implemented, it helps solve the problems of hackers if not 100% but 80% is solved, because you cannot fully secure a network, it has not been proved yet.
Please Note:
We represent an esteemed online resource center duly registered with the Corporate Affairs Commission (CAC). Our commitment to integrity and reliability underscores our ethos, ensuring that our services are delivered with utmost trustworthiness. It is our solemn assurance that we conduct our operations with the highest ethical standards, thereby precluding any possibility of deception or fraudulent activities. Guided by our reverence for ethical conduct, we pledge to uphold the principles of honesty and transparency in all our dealings. Rest assured, upon confirmation of your payment, our dedicated team endeavors to promptly furnish you with the requisite project materials within a timeframe of 30 minutes.
We further emphasize that the materials provided are intended for reference purposes, and it is incumbent upon the buyer to adapt and tailor the content to meet their specific requirements. It is imperative to exercise due diligence in ensuring that any utilization of the project or research content is in accordance with academic integrity standards, thus mitigating the risk of plagiarism
Projects are sent in MS word format within 30 minutes - 60 minutes of payment confirmation. For questions and complaints call or WhatsApp: +2348062235854 or +2348166784138
NOTE: By ordering for this material, you have read and agreed with our Terms of use
Payment Methods
NOTE: It's highly recommended to before making a purchase to enjoy the benefits as a registered user.
Feature Project Topics
-
MICROBIOLOGICAL, PHYSICAL AND CHEMICAL PARAMETERS OF HAND DUG WELL LOCATED CLOSE TO A SEPTIC TANK IN IJEBU, OGUN STATE
Microbiology38
8,556
5
-
ANTIMICROBIAL ACTIVITY OF SOME LOCAL COSMETIC PRODUCTS ON SELECTED BACTERIAL
Microbiology36
8,148
5
-
LOCATIONAL ANALYSIS OF CEMETERIES IN DEVELOPING REGIONS: A CASE OF IJEBU NORTH LOCAL GOVERNMENT AREA, OGUN STATE, NIGERIA.
Geography and Regional Planning/Transport Mgt49
8,082
4
-
COMMERCIALIZING DANCE THROUGH ORGANIZATIONAL PROMO: CHALLENGES AND PROSPECTS
Theater and Performing Arts48
8,679
5
-
EFFECTS OF COOPERATIVE LEARNING APPROACH ON ACADEMIC ACHIEVEMENT IN SECONDARY SCHOOL CHEMISTRY: A META-ANALYSIS OF FINDINGS
Education64
13,430
5