O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

As we learned in the previous chapter, the integrity of data is an essential component of security, but it is only one piece of the CIA triad. Another leg of this triad is the aspect of confidentiality, which addresses the issues relating to the protection of information against unauthorized disclosure. This aspect alone can be a make or break issue for an organization, as losing control of information and having that same information appear on a website, in a newspaper, or another outlet can be the source of a lot of negative consequences—including lawsuits.

A great example of how a compromised wireless network can lead to serious consequences against a company is that of retailer TJ Maxx. In the early 2000s, TJ Maxx left a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required