O'Reilly logo

Mac® Security Bible by Joe Kissell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

16.7. Summary

This chapter explored the ways in which wireless networks are more prone to security issues than their wired counterparts and how to eliminate or mitigate the most common areas of risk. I began with an overview of the main technologies used to encrypt Wi-Fi traffic, including WEP, WPA, and 802.1X, outlining the benefits and limitations of each one.

Next, I walked you through the nuts and bolts of configuring the various security settings of Apple AirPort base stations and provided a brief overview of how to accomplish similar things with several common third-party brands of wireless access points. Because the access point is only half the equation, I then described how to set up your Mac to take advantage of the security features of your wireless network.

A discussion of the perils of public Wi-Fi hotspots followed, along with tips for keeping your network traffic safe when working in unfamiliar wireless territory. Finally, I described several common tools for locating Wi-Fi networks in your vicinity and determining their security features.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required