Chapter 14. Wireless Security
On completing this chapter, you will be able to
Explain the different WLAN configurations
Explain how WLANs work
Describe the risks of open wireless ports
Describe SAFE WLAN design techniques
This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it. Wireless networking has limitations, involves some risks, and requires defense techniques, as you learn in this chapter. All network architectures, including the wireless networking sector of an organization's network, should be based on sound security policies. These policies are designed to address all the weaknesses and threats that can occur in today's large, wireless TCP/IP-based ...
Get Network Security Fundamentals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.