Recognizing and Administering Security Controls—Wireless

Understand communication security in wireless, wired, and application-specific environments.

Wireless communications, reviewed in part earlier in the chapter in the “Recognizing and Administering Remote and Wireless Access” section, enable certain technologies that make it easier to deploy and use networks than ever before. Unfortunately, several significant threats are associated with transferring data across the open air, including eavesdropping and data interception, man-in-the-middle attacks, impersonation and authentication replays, and so forth. Wireless security controls address most of these risks, but some create new risks. The following sections review security controls employed ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.