Paper
9 February 2012 Using wi-fi hotspots as an intrusion vector into corporate networks
Maximilian Scharsich, Friedrich L. Holl
Author Affiliations +
Abstract
The following paper describes a method of gaining access to corporate networks through users who use virtual private networks over a modified Hotspot under the control of an attacker.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Maximilian Scharsich and Friedrich L. Holl "Using wi-fi hotspots as an intrusion vector into corporate networks", Proc. SPIE 8304, Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 83040C (9 February 2012); https://doi.org/10.1117/12.908482
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Control systems

Network security

Computer security

Data communications

Java

Multimedia

RELATED CONTENT

World Wide Web telemedicine system
Proceedings of SPIE (May 01 1996)
Security architecture of the M&M mobile agent framework
Proceedings of SPIE (July 12 2001)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Computer loss experience and predictions
Proceedings of SPIE (March 12 1996)
Interactive personalized newspaper on the WWW
Proceedings of SPIE (March 25 1996)
Quality of service in wireless internet architectures
Proceedings of SPIE (July 27 2001)

Back to Top