O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing wireless networks

Items to consider when implementing a secured wireless implementation include:

  • Client and access point authentication
  • Wireless network encryption

A quick note on SSID cloaking and MAC filtering

It was once thought that simply hiding or cloaking the presence of the wireless network was sufficient to thwart attackers. And adding MAC address filtering to limit host access was considered a valid method to "authenticate" hosts. Both of these methods have proven to be ineffective to secure a wireless network implementation. Cloaking or attempting to hide an SSID is easily undermined by the inherent nature of wireless network communication design. When a host has already connected to a hidden network, the next time the wireless ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required