O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Recognizing and Administering Security Controls—Wireless

Understand communication security in wireless, wired, and application-specific environments.

Wireless communications, reviewed in part earlier in the chapter in the “Recognizing and Administering Remote and Wireless Access” section, enable certain technologies that make it easier to deploy and use networks than ever before. Unfortunately, several significant threats are associated with transferring data across the open air, including eavesdropping and data interception, man-in-the-middle attacks, impersonation and authentication replays, and so forth. Wireless security controls address most of these risks, but some create new risks. The following sections review security controls employed ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required