Analysis of Vulnerabilities in the Wireless Network of an Educational Institution

Enrique Augusto Luzuriaga Tejada, Javier Guaña-Moya, Paola Alejandra Espinosa Cevallos, Paulina Jaramillo Flores

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    This study aims to examine the vulnerabilities of the wireless network of an educational institution by conducting controlled penetration attacks. The central objective is to identify and analyze the main weaknesses of the wireless network infrastructure in order to suggest improvement measures to ensure confidentiality, integrity and availability of information. The plan was based on the PTES penetration testing methodology, and each phase was meticulously carried out, documenting every important aspect to ensure a complete evaluation. The results and conclusions focused on improving the security of wireless networks, reducing identified risks and strengthening cyber defenses against future threats. The research conducted, in addition to emphasizing the importance of network security in an educational environment also provides a practical and detailed model for assessing the security of wireless networks. The project conducted in addition to emphasizing the importance of network security in an educational environment also provides a detailed model for assessing the security of wireless networks.

    Original languageEnglish
    Title of host publicationInformation Technology and Systems, ICITS 2025
    EditorsAlvaro Rocha, Carlos Ferrás, Hiram Calvo
    PublisherSpringer Science and Business Media Deutschland GmbH
    Pages83-92
    Number of pages10
    ISBN (Print)9783031931086
    DOIs
    StatePublished - 2025
    EventInternational Conference on Information Technology and Systems, ICITS 2025 - Mexico City, Mexico
    Duration: Jan 22 2025Jan 25 2025

    Publication series

    NameLecture Notes in Networks and Systems
    Volume1447 LNNS
    ISSN (Print)2367-3370
    ISSN (Electronic)2367-3389

    Conference

    ConferenceInternational Conference on Information Technology and Systems, ICITS 2025
    Country/TerritoryMexico
    CityMexico City
    Period01/22/2501/25/25

    Keywords

    • cyber-attack
    • Cybersecurity
    • ethical hacking
    • penetration testing
    • vulnerability

    Fingerprint

    Dive into the research topics of 'Analysis of Vulnerabilities in the Wireless Network of an Educational Institution'. Together they form a unique fingerprint.

    Cite this