O'Reilly logo

Privacy Defended: Protecting Yourself Online by Chris Weber, William Chan, Gary Bahadur

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How Can You Protect Yourself?

Despite the risks and vulnerabilities that are associated with wireless networking, certain circumstances do demand their use. As with everything we do, we can take steps to minimize the risks and make hacking into a WLAN a more difficult exercise for potential intruders.

If the use of wireless technology is in the corporate environment, be sure it include it in all of the overall network security policy, procedures, and best practices. Wireless networks need to be treated under the same rules as wired networks. Extra care should be taken in implementing wireless networks because, as we saw, they are even more vulnerable than wired ones.

Be sure to include your wireless networks in the next security vulnerability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required