Introduction

As we learned in the previous chapter, the integrity of data is an essential component of security, but it is only one piece of the CIA triad. Another leg of this triad is the aspect of confidentiality, which addresses the issues relating to the protection of information against unauthorized disclosure. This aspect alone can be a make or break issue for an organization, as losing control of information and having that same information appear on a website, in a newspaper, or another outlet can be the source of a lot of negative consequences—including lawsuits.

A great example of how a compromised wireless network can lead to serious consequences against a company is that of retailer TJ Maxx. In the early 2000s, TJ Maxx left a ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.