USING VISUALIZATION TO LOCATE ROGUE ACCESS
Essay specific features
December 25, 2014
No of pages / words:
13 / 3372
Rating of current essay:
As part of a class project, students
in our Computer Security course assisted in the development of a software tool,
called WiVis, that uses interactive visualization to locate rogue access points.
Distributed sensors are “profile mapped” to determine how they receive wireless
signals from the environment around them...
displayed 300 characters
Order custom writing paper now!
- Your research paper is written
by certified writers
- Your requirements and targets are
- You are able to control the progress
of your writing assignment
- You get a chance to become an
Get a price guote
Visual displays of the maps as
contour lines are overlaid onto a schematic of the office or lab space. When
sensors detect an access point, contour line intersection visually show the
predicted location of the device. The tool runs on standard platforms and requires
no special hardware.
Rogue access points are a critical security risk to wireless enterprise networks...
displayed next 300 characters
General issues of this essay:
1 pages, 227 words
2 pages, 385 words
2 pages, 330 words
2 pages, 442 words
2 pages, 497 words
1 pages, 256 words
4 pages, 846 words