Proposal

Get Started. It's Free
or sign up with your email address
Rocket clouds
Proposal by Mind Map: Proposal

1. 1. Introduction

1.1. 1.1 Research Problrems

1.2. 1.2 Aims and Objectives

1.3. 1.3 Research Background

1.4. 1.4 Significance of Study

1.5. 1.5 Limitations of Study

2. 2. Literature Review

2.1. 2.1 Introduction

2.1.1. WEP

2.1.2. ACLs

2.1.3. 802.11 Authentication

2.1.4. SSID

2.2. 2.2 VoIP

2.2.1. WEP Encryption

2.2.2. WEP Data Integrity

2.2.3. ACLs

2.2.4. Shared key Authenticaion

2.2.5. SSID

2.3. 2.3 IPv6

2.3.1. Place Edge Firewall

2.3.2. Employ VPN

2.3.3. Turn on WEP

2.3.4. Alternatives to VPN - SSH & IPSec

2.3.5. Key Management

2.3.6. Place Client Firewall

2.3.7. Reduce Power

2.3.8. Test your security

2.3.9. EAP

2.4. 2.4 IPSec

3. 3. Research Methodology

3.1. 3.1 Approach

3.2. 3.2 Implementation

3.2.1. Building Test Scenario

3.2.2. Participants

3.2.3. Data Garthering

3.2.4. Data Analysing

3.3. 3.3 Anticipated Outcomes

3.4. 3.4 Ensuring Reliable Resutls

3.5. 3.5 Ethical Issues

3.6. 3.6 Anticipated Problems

3.7. 3.7 Timeline

3.8. 3.8 Resource Requirements

4. 4. Bibliography