시작하기. 무료입니다
또는 회원 가입 e메일 주소
Proposal 저자: Mind Map: Proposal

1. 2. Literature Review

1.1. 2.1 Introduction

1.1.1. WEP

1.1.2. ACLs

1.1.3. 802.11 Authentication

1.1.4. SSID

1.2. 2.2 VoIP

1.2.1. WEP Encryption

1.2.2. WEP Data Integrity

1.2.3. ACLs

1.2.4. Shared key Authenticaion

1.2.5. SSID

1.3. 2.3 IPv6

1.3.1. Place Edge Firewall

1.3.2. Employ VPN

1.3.3. Turn on WEP

1.3.4. Alternatives to VPN - SSH & IPSec

1.3.5. Key Management

1.3.6. Place Client Firewall

1.3.7. Reduce Power

1.3.8. Test your security

1.3.9. EAP

1.4. 2.4 IPSec

2. 4. Bibliography

3. 1. Introduction

3.1. 1.1 Research Problrems

3.2. 1.2 Aims and Objectives

3.3. 1.3 Research Background

3.4. 1.4 Significance of Study

3.5. 1.5 Limitations of Study

4. 3. Research Methodology

4.1. 3.1 Approach

4.2. 3.2 Implementation

4.2.1. Building Test Scenario

4.2.2. Participants

4.2.3. Data Garthering

4.2.4. Data Analysing

4.3. 3.3 Anticipated Outcomes

4.4. 3.4 Ensuring Reliable Resutls

4.5. 3.5 Ethical Issues

4.6. 3.6 Anticipated Problems

4.7. 3.7 Timeline

4.8. 3.8 Resource Requirements