A Theoretical Analysis of Different Hacking Techniques in Wireless Networks 

Abstract

Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the programmers who unethically make use of our personal information, they may steal it and use for some unwanted purpose. They are greatly motivated by a massive amount of profit, challenge, strong efforts, to assist in performing illegal activities. All hackers do not follow a same technique to perform illegal tasks. It will vary depending upon the security of information and the depth of the content involved in it. There are a large number of hacking techniques available in wireless networks. In this theoretical analysis, the systematic methodology of various techniques that the hacker follows to attack a machine or sensitive information of the users has been scrutinized.

Authors and Affiliations

Mr. S. Manimaran , S. Kaviya , S. Josphin Anitha , S. Meiyappan

Keywords

Related Articles

Automatic Classification of ECG Signal for Heart Disease Diagnosis using morphological features

An Electrocardiogram (ECG) is a test that records the electrical activity of the heart to locate the abnormalities. Automatic ECG classification is an emerging tool for the cardiologists in medical diagnosis for effectiv...

A LITERATURE SURVEY ON MULTITHREADING TECHNIQUES TO AVOID DATA LOSS IN CLOUD STORAGE

“Security” is a one of the important issues in cloud computing environment. Cloud computing is used to deliver software, storage and processing for millions of users across the world. In the user environment, it is the c...

Imperative & challenges of mobile banking in India

As mobile is new technology in financial and banking sector. This technology help us to save our time and provide facilities to get the information about our account, transaction and transfer the money from one account t...

Offline Handwritten & Typewritten Character Recognition using Template Matching

In the modern times identity verification has become an important task for various reasons. Mostly identity provided by the authorities is the combination of characters & digits. Now there are several techniques avai...

An Efficient Approach to Minimize Data Collection Delay in Wireless Sensor Networks

Data assortment latency might become higher attributable to the comparatively slow travel speed of mobile components . Thus , the planning of mobile components , i.e. , however they traverse through the sensing field and...

Download PDF file
  • EP ID EP100911
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Mr. S. Manimaran, S. Kaviya, S. Josphin Anitha, S. Meiyappan (2015). A Theoretical Analysis of Different Hacking Techniques in Wireless Networks . International Journal of Computer Science & Engineering Technology, 6(9), 575-579. https://europub.co.uk/articles/-A-100911