Assessing the Information Assets

The first question to ask yourself is, “What are we protecting?” In other words, you need to perform an inventory of the information assets for your organization.

Think about your existing investment in perimeter security. You probably already have a firewall in place. This is typically done to enforce some kind of policy or rule set about the kind of network traffic that is allowed in or allowed out of the network. As a consultant in the early days of wireless, one of the most common security no-nos that I observed was for a person in the IT Group (or even a power user) to take an off-the-shelf inexpensive AP and just plug it into an empty RJ45 jack someplace on the network, thereby exposing their internal network ...

Get How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.