dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Ramírez, Juan | |
dc.contributor.author | Sanabria Andrade, Manuel | |
dc.date.accessioned | 2020-10-27T15:10:48Z | |
dc.date.available | 2020-10-27T15:10:48Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | Sanabria Andrade, M. (2012). What kinds of various wireless attacks can occur in mobile and wireless-driven devices? [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/908 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | Abstract - Networks have been recently redefined by new devices in the market. These networks, comprised of a group of electronic devices, can be connected either using cables or using wireless technologies. Also, they have been implemented, not only in commercial places but also in households and home offices, among which reasons range from affordability to accessibility and ease of installation. However, these networks bear some significant risks when used: network attacks. Network attacks are one of the most common attacks to computer systems during these periods of time, where attackers are focusing on computers or other devices connected to a network, particularly if these are in wireless networks, and including cell phones, computers, and tablet pc, among others.
Key Terms - Attacks, Mobile Devices, Security, Wireless | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Fall-2012; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Computer networks--Security measures | en_US |
dc.subject.lcsh | Mobile computing--Security measures | en_US |
dc.subject.lcsh | Hackers | en_US |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | What Kinds of Various Wireless Attacks can Occur in Mobile and Wireless-Driven Devices? | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |