Paper
9 February 2012 Using wi-fi hotspots as an intrusion vector into corporate networks
Maximilian Scharsich, Friedrich L. Holl
Author Affiliations +
Abstract
The following paper describes a method of gaining access to corporate networks through users who use virtual private networks over a modified Hotspot under the control of an attacker.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Maximilian Scharsich and Friedrich L. Holl "Using wi-fi hotspots as an intrusion vector into corporate networks", Proc. SPIE 8304, Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 83040C (9 February 2012); https://doi.org/10.1117/12.908482
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Control systems

Network security

Computer security

Data communications

Java

Multimedia

RELATED CONTENT

Security architecture of the M&M mobile agent framework
Proceedings of SPIE (July 12 2001)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Quality of service in wireless internet architectures
Proceedings of SPIE (July 27 2001)
Creating the virtual enterprise with VE gateways
Proceedings of SPIE (January 21 1997)
ZigBee device management system using web gateway
Proceedings of SPIE (January 09 2008)

Back to Top