Get Started. It's Free
or sign up with your email address
Proposal by Mind Map: Proposal

1. 2. Literature Review

1.1. 2.1 Introduction

1.1.1. WEP

1.1.2. ACLs

1.1.3. 802.11 Authentication

1.1.4. SSID

1.2. 2.2 VoIP

1.2.1. WEP Encryption

1.2.2. WEP Data Integrity

1.2.3. ACLs

1.2.4. Shared key Authenticaion

1.2.5. SSID

1.3. 2.3 IPv6

1.3.1. Place Edge Firewall

1.3.2. Employ VPN

1.3.3. Turn on WEP

1.3.4. Alternatives to VPN - SSH & IPSec

1.3.5. Key Management

1.3.6. Place Client Firewall

1.3.7. Reduce Power

1.3.8. Test your security

1.3.9. EAP

1.4. 2.4 IPSec

2. 4. Bibliography

3. 1. Introduction

3.1. 1.1 Research Problrems

3.2. 1.2 Aims and Objectives

3.3. 1.3 Research Background

3.4. 1.4 Significance of Study

3.5. 1.5 Limitations of Study

4. 3. Research Methodology

4.1. 3.1 Approach

4.2. 3.2 Implementation

4.2.1. Building Test Scenario

4.2.2. Participants

4.2.3. Data Garthering

4.2.4. Data Analysing

4.3. 3.3 Anticipated Outcomes

4.4. 3.4 Ensuring Reliable Resutls

4.5. 3.5 Ethical Issues

4.6. 3.6 Anticipated Problems

4.7. 3.7 Timeline

4.8. 3.8 Resource Requirements