TY - JOUR T1 - Wi-Fi Security Analysis For E&M-Government Applications AU - Efe, Ahmet AU - Kaplan, Mesrure Betül PY - 2019 DA - December JF - International Journal of Multidisciplinary Studies and Innovative Technologies JO - IJMSIT PB - SET Teknoloji WT - DergiPark SN - 2602-4888 SP - 86 EP - 98 VL - 3 IS - 2 LA - en AB - As a sub-branch of Radio Frequency (RF) technology, the Wi-Fi and itsarea of usage has evolved over time and become pervasive for availability ofall e-government applications and services. Computers and many other devices,including smart phones and PDAs, can connect to the internet wirelessly usingWi-Fi. Also, wireless networks are desirable to many organizations because they increase workforce flexibility and savecabling costs. Wi-Fi is considered as the main internet connection for home,small corporate and localgovernment internal networks, while for central government and mid and big size companies it is a complementaryand parallel to cabled internet. As the war-driving has become one of the majorthreats to Wi-Fi users, free-to-serve and open-to-public Wi-Fi poses anotherthreat to hackers and lamer as they can hide themselves to catch their internettraffic and credentials. That is why; the Wi-Fi and its security becomeimportant and popular concepts in the knowledge era and technological era. Forall various users that range from experts who work at computer science orinformation technology, to novices who use the Internet; this paper describesthe fundamental Wi-Fi and Wi-Fi security issues to establish a greaterawareness. KW - Wireless Fidelity KW - WLAN KW - IEEE e-government security CR - [1]. Coleman, D. D. (2007). CWSP Certified Wireless Security Professional Study Guide: Exam CWSP-205. USA: Wiley. CR - [2]. Collins, T. (2017). 'Almost all' home routers are at risk of being HACKED. Retrieved 02 11, 2018, from dailymail: http://www.dailymail.co.uk/sciencetech/article-4984166/Flaw-WPA2-lets-cyber-criminals-spy-WiFi-network.html[3]. Dark. (2015). Cracking MD5, phpBB, MySQL and SHA1 passwords with Hashcat on Kali Linux. Retrieved 02 20, 2018, from Dark more ops: https://www.darkmoreops.com/2014/08/14/cracking-md5-phpbb-mysql-and-sha1-passwords-with-hashcat/ CR - [4]. Digi. (2008). An Introduction to Wifi. Retrieved 02 25, 2018, from Digi international: http://ftp1.digi.com/support/documentation/0190170_b.pdf CR - [5]. Egov. (2014). e-government vs. m-government. Retrieved 02 22, 2018, from egovconcopts: www.egovconcepts.com CR - [6]. Engst, A., & Fleishman, G. (2004). “The Wireless Networking Starter Kit. CA. CR - [7]. Frankel, S., Eydt, B., Owens, L., & Scarfone, K. (2007). Establishing Wireless Robust Security Networks. Retrieved 02 11, 2018, from Nist: http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-97.pdf CR - [8]. Greenberg, A. (2015). Human error cited as leading contributor to breaches, study shows. scmagazine, https://www.scmagazine.com/study-find-carelessness-among-top-human-errors-affecting-security/article/535928/. CR - [9]. Griffith, E. (2016). 12 Ways To Secure Your Wi-Fi Network. pcmag, http://www.pcmag.com/article2/0,2817,2409751,00.asp . CR - [10]. Huang, L., Ye, X.-E., & Shi, X. (2014). The Design and Application of WiFi-Smart Socket in Smart Home. Advanced Material Research. CR - [11]. ISACA. (2017). Cybersecurity Fundamentals Certificate. Retrieved 02 10, 2018, from ISACA: https://cybersecurity.isaca.org/csx-certifications/csx-fundamentals-certificate CR - [12]. James, S. (2017). The real risk of cyber attack on unsecured networks. Retrieved 02 10, 2018, from computerweekly: http://www.computerweekly.com/feature/Security-Zone-The-real-risk-of-cyber-attack CR - [13]. Karthik, K., & kuracha, S. (2015). Security in Wireless Cellular Networks. International Journal of Application or Innovation in Engineering & Management (IJAIEM). CR - [14]. Micro. (2015). Elecromagneticspectrum. Retrieved 02 11, 2018, from microworlds: http://www2.lbl.gov/MicroWorlds/ALSTool/EMSpec/EMSpec2.html CR - [15]. Mitchell, B. (2017). Wireless Standards 802.11a, 802.11b/g/n, and 802.11ac. https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-816553: Lifewire. CR - [16]. News. (2017). 'All wifi networks' are vulnerable to hacking, security expert discovers. Retrieved 02 22, 2018, from The Guardian: https://www.theguardian.com/technology/2017/oct/16/wpa2-wifi-security-vulnerable-hacking-us-government-warns CR - [17]. NSK. (2014). What is wirelss Network? and how its differs with Wired Network? . Networking, http://255net.com/2014/538/. CR - [18]. Ranjan, S., R.N.Shukla, & Lohia, P. (2014). Information security analysis of Wi-Fi networks. International Journal of Electronics, Electrical and Computational System. CR - [19]. Rowan, T. (2010). Negotiating WiFi security. Network Security, 8-12. CR - [20]. Safer. (2017). 10 Public Wi-Fi Security Threats You Need to Know. Retrieved 02 22, 2018, from safervpn: https://www.safervpn.com/blog/10-public-wi-fi-security-threats/ CR - [21]. Scarfon, K., & Dicoi, D. (2007). Wireless Network Security for IEEE 802.11. Retrieved 01 22, 2018, from Nist: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.6200&rep=rep1&type=pdf CR - [22]. Shaban, H. (2017). Every modern, protected WiFi network is vulnerable, warns government cybersecurity watchdog. Retrieved 02 20, 2018, from TheWashington Post: https://www.washingtonpost.com/news/the-switch/wp/2017/10/16/every-modern-protected-wifi-network-is-vulnerable-warns-government-cyber-watchdog/?utm_term=.a2a7d35c21bc CR - [23]. Stanley, R. A. (2005). Managing Risk in the Wireless Environment: Security, Audit and Control Issues. USA: ISACA. CR - [24]. Wiki. (2017). Wireless security. Retrieved 02 11, 2018, from Wikipedia: https://en.wikipedia.org/wiki/Wireless_security CR - [25]. Zhou, Z., & Hu, C. (2008). Study on the E-government Security Risk Management. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May, 2008-2013. UR - https://dergipark.org.tr/en/pub/ijmsit/issue//617035 L1 - https://dergipark.org.tr/en/download/article-file/859231 ER -