Chapter 14. Wireless Security

On completing this chapter, you will be able to

  • Explain the different WLAN configurations

  • Explain how WLANs work

  • Describe the risks of open wireless ports

  • Describe SAFE WLAN design techniques

This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it. Wireless networking has limitations, involves some risks, and requires defense techniques, as you learn in this chapter. All network architectures, including the wireless networking sector of an organization's network, should be based on sound security policies. These policies are designed to address all the weaknesses and threats that can occur in today's large, wireless TCP/IP-based ...

Get Network Security Fundamentals now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.