Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Category: Wireless

WI-FI Wireless Attacks

Posted on by

WI-FI Wireless uses radio waves for communication between wireless devices that are connected to the WI-FI network. As the wireless devices uses the open space for communication, it’s an open target for attacks. Attackers use WI-FI wireless attack methodologies before performing the actual attack. The following are the attacks performed on WI-FI wireless networks: DoS…

Read more

Wi-Fi Wireless Hacking Methodology

Posted on by

Wi-Fi uses wireless for communication in an open space which makes it easy target for attackers. Wi-Fi Network is available almost everywhere at streets, organizations, public infrastructure. An attacker just needs a computing device like a laptop or mobile to hack a Wi-Fi network. The following is the Wi-Fi wireless hacking methodology: Discover the Wi-Fi…

Read more

Wireless Security

Posted on by

Wireless Security is the security mechanism implemented in Wi-Fi Wireless network to protect it from un-authorized access performed by attackers. IEEE 802.11i is the security standard amendment for IEEE 802.11 wireless standard. Wired Equivalent Privacy (WEP) was the initial security algorithm used in IEEE 802.11. WEP was vulnerable and exploitable. Wi-Fi Alliance brought in WPA…

Read more

Wireless Network

Posted on by

Wireless Network is a Network that uses Wireless for Communication for data and voice transmission. Wireless Network doesn’t use physical cables for data transmission rather it uses radio waves to transmit data. Wireless Personal Area Network, Wireless Local Area Network (WLAN), Cellular Networks, Wireless Metropolitan Area Network (WMAN), Wireless Wide Area Network (WWAN) are various Wireless…

Read more

Radio waves

Posted on by

Radio waves are waves of high wavelength and low frequency in the electromagnetic wave spectrum. The Radio wave spectrum frequency ranges from 3 KHz to 3,000 GHz. Radio Waves are governed by International Telecommunication Union (ITU). The theory of Radio Waves was brough in by Physicist and Mathematician James Clerk Maxwell in 1865. In 1880s, Physicist Heinrich Rudolf Hertz proved…

Read more

Wireless

Posted on by

Wireless also known as Wireless Communication is the term referred when the communication between systems happens without any physical wires. The communication of data or voice happens in free space using Radio waves. Radio waves are electromagnetic waves with low frequency and high wavelength in the electromagnetic spectrum. Wireless is used in Wi-Fi Network, Satellite…

Read more

Electromagetic Waves

Posted on by

Electromagnetic (EM) wave also known as Electromagnetic Radiation is a self-propagating wave energy that travels at the speed of light in the form oscillating electric and magnetic fields perpendicular to each other. Electromagnetic Wave is generated when electric particles are accelerated though matter which generates electromagnetic radiation. Electromagnetic waves can travel through vacuum. Accelerating electric charge…

Read more

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme