O'Reilly logo

Hacking Wireless Access Points by Jennifer Kurtz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Summary and Call to Action

Abstract

We all have choices about how we implement and use technology, making our own personal cost/benefit calculation about our appetite for risk versus convenience and prioritizing actions (or inactions) accordingly. Hacks are continually evolving, forcing updates to mitigation approaches that combat the hacks. The number of WAPs and mobile devices are increasing (with some devices acting as both access points and mobile devices) as the IoT, self-driving cars and self-flying drones become a reality. New hacks will be created for these new environments. Because of this, mobile device risk management is an ongoing journey, not a destination. Money is not a reasonable excuse for not having a security plan for ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required