<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ahmad Mashhour</style></author><author><style face="normal" font="default" size="100%">Zakaria Saleh</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Evaluating Wireless Networks Security in Jordan: A Field Study</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">security</style></keyword><keyword><style  face="normal" font="default" size="100%">Wardriving</style></keyword><keyword><style  face="normal" font="default" size="100%">WEP</style></keyword><keyword><style  face="normal" font="default" size="100%">Wired Equivalent Privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">Wirless Local Area Network</style></keyword><keyword><style  face="normal" font="default" size="100%">WLAN</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2011</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">26</style></volume><pages><style face="normal" font="default" size="100%">34-43</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The attractiveness of wireless networks, combined with the vulnerabilities those networks are exposed to, has caused an increase in the number of insecure computer networks that can be accessed without authorisation. The purpose of the study is to provide an evaluation of the Wireless Network environment in Jordan in view of the use of the WLAN equipment as well as the use of security setting of the equipment. Caution will be taken to avoid network access as only existence of the network is sought. Wardriving involve the use of freeware tools such as NetStumbler, or Kismet, which was originally developed to be used for helping network administrators make their systems more secure. In this paper, we will demonstrate through field evaluation of the Wireless Local Area Network that the problem of wardriving can be quite severe, and some measures need to be taken to improve security by wireless network users.</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue><section><style face="normal" font="default" size="100%">34</style></section></record></records></xml>