O'Reilly logo

Defend I.T.: Security by Example by Scott Laliberte, Ajay Gupta

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Look, Ma, No Wires!

Not all security engagements are a response to hacks. Sometimes we’re called in during the initial stages of a project. This case study discusses such a situation. A bank was interested in implementing a wireless network, but because of concerns about the lack of security associated with wireless networks, it requested an initial design and implementation review and evaluation of the proposed wireless network.

We were asked to evaluate the existing implementation and recommend measures to improve security that could be taken prior to the launch of the network. This is a good situation, and we are always happy to take part in this early stage (the earlier the better). Often, only so much security can be retrofitted ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required