A Theoretical Analysis of Different Hacking Techniques in Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 9
Abstract
Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the programmers who unethically make use of our personal information, they may steal it and use for some unwanted purpose. They are greatly motivated by a massive amount of profit, challenge, strong efforts, to assist in performing illegal activities. All hackers do not follow a same technique to perform illegal tasks. It will vary depending upon the security of information and the depth of the content involved in it. There are a large number of hacking techniques available in wireless networks. In this theoretical analysis, the systematic methodology of various techniques that the hacker follows to attack a machine or sensitive information of the users has been scrutinized.
Authors and Affiliations
Mr. S. Manimaran , S. Kaviya , S. Josphin Anitha , S. Meiyappan
Automatic Classification of ECG Signal for Heart Disease Diagnosis using morphological features
An Electrocardiogram (ECG) is a test that records the electrical activity of the heart to locate the abnormalities. Automatic ECG classification is an emerging tool for the cardiologists in medical diagnosis for effectiv...
A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE
“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...
Imperative & challenges of mobile banking in India
As mobile is new technology in financial and banking sector. This technology help us to save our time and provide facilities to get the information about our account, transaction and transfer the money from one account t...
Offline Handwritten & Typewritten Character Recognition using Template Matching
In the modern times identity verification has become an important task for various reasons. Mostly identity provided by the authorities is the combination of characters & digits. Now there are several techniques avai...
An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks
Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...