Chapter 1. Regulatory and Organizational Security Compliance

Failure to secure a WLAN makes it vulnerable to attacks. To properly secure your network, you must be able to identify common threats to wireless and know how to counteract them. You also need to secure your network access (management users, regular users, guests).

Identifying Wireless Vulnerabilities

Wireless vulnerabilities are grouped in four categories: Rogues (rogue access points (AP) [including hacker APs, evil twins, and honeypots], rogue clients, ad hoc clients, denial-of-service (DoS) attacks and other over-the-air attacks (including network reconnaissance, eavesdropping, and traffic cracking), guest network control, and legitimate user network control (making sure that each ...

Get CCNP Wireless (642-737 IAUWS) Quick Reference now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.