USING VISUALIZATION TO LOCATE ROGUE ACCESS
Essay specific features


Written by:
Kathy H
Date added:
December 25, 2014
Level:
University
Grade:
A
No of pages / words:
13 / 3372
Was viewed:
3859 times
Rating of current essay:
Essay content:
As part of a class project, students
in our Computer Security course assisted in the development of a software tool,
called WiVis, that uses interactive visualization to locate rogue access points.
Distributed sensors are “profile mapped” to determine how they receive wireless
signals from the environment around them...
displayed 300 characters
Custom written essay
All essays are written from scratch by professional writers according to your instructions and delivered to your email on time. Prices start from $11.99/page
Order custom paperFull essays database
You get access to all the essays and can view as many of them as you like for as little as $28.95/month
Buy database accessOrder custom writing paper now!
- Your research paper is written
by certified writers - Your requirements and targets are
always met - You are able to control the progress
of your writing assignment - You get a chance to become an
excellent student!
Get a price guote
Visual displays of the maps as
contour lines are overlaid onto a schematic of the office or lab space. When
sensors detect an access point, contour line intersection visually show the
predicted location of the device. The tool runs on standard platforms and requires
no special hardware.
INTRODUCTION
Rogue access points are a critical security risk to wireless enterprise networks...
displayed 300 characters
General issues of this essay:
Related essays:
-
2 pages, 323 words
-
1 pages, 256 words
-
2 pages, 385 words
-
2 pages, 330 words
-
2 pages, 497 words
-
4 pages, 846 words
-
2 pages, 442 words