O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

Wireless networks are as common as wired networks in today's enterprise environments providing access to internal assets from anywhere on campus. With this convenience come additional attack vectors to enterprise assets and data that must be planned for and proper security mechanisms implemented for mitigation. Implementing secure encryption and authentication methods can provide a wireless network to enterprise users that meet their needs and ensure the security of enterprise assets. It is important that a layered approach of security is implemented to address the attacks common to wireless networks including having an intrusion prevention mechanism to detect and mitigate common and advanced attacks. Supporting processes for alert management ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required