O'Reilly logo

Hacking Wireless Access Points by Jennifer Kurtz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Hacking Wireless Access Points

Governmental Context

Abstract

The number of US breaches reported publicly for all levels of government between 2005 and mid-2016 was 314 with at least 148,491,010 records (not individuals) compromised. In spite of a decade of work to break down bureaucratic silos between agencies, partly in support of eGovernment initiatives, the standard of care over digital assets is not uniform either vertically (at multiple layers of government) or horizontally (across government service or functional categories). Meanwhile, agencies are often dependent upon external contractors that may not follow best practices for information asset protection (e.g., contractors implicated in the successful exploit against the US ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required