Chapter 1. Regulatory and Organizational Security Compliance
Failure to secure a WLAN makes it vulnerable to attacks. To properly secure your network, you must be able to identify common threats to wireless and know how to counteract them. You also need to secure your network access (management users, regular users, guests).
Identifying Wireless Vulnerabilities
Wireless vulnerabilities are grouped in four categories: Rogues (rogue access points (AP) [including hacker APs, evil twins, and honeypots], rogue clients, ad hoc clients, denial-of-service (DoS) attacks and other over-the-air attacks (including network reconnaissance, eavesdropping, and traffic cracking), guest network control, and legitimate user network control (making sure that each ...